Sunday, September 1, 2013

Android Users: Specially for you. Be alert

This is specially for all Android users, because now a days android is so popular so attackers targeted this mobile operating system. Guys be secure and safe while accessing through your mobile phones. Read furthermore to secure your privacy. :)

Android user be safe

In Android phone, more malware distributed through mobile ad networks. You are confusing what is mobile ad network? Answer is : Advertising network or Ad network is a company that connects advertisers to publishers or web sites that want to host advertisement. Examples are - AdBuddiz, admob etc.

Mobile ad-network can provide a loophole to serve malware to Android devices, according to researchers from security firm Palo Alto Networks who have found new Android threats being distributed in this manner. That's is vulnerable for the surfing.

Most mobile developers embed advertising frameworks into their applications in order to generate revenue. Unlike ads displayed inside Web Browsers, ads displayed within mobile apps are served by code that's actually part of those applications. (Generate revenue through the ads display as well as the number of visitors).

The embedding of code for the advertising network into a mobile application itself ensures that ads get tracked and the developers get paid, but at the same time the third-party code represents a backdoor into the device, said Wade Williamson, senior security at Palo Alto Networks.

"If the mobile ad network turns malicious, then a completely benign application could begin bringing down malicious content to the device" Williamson said. There are precedents for this type of attack.  In April, mobile security firm Lookout identified 32 apps hosted on Google Play that were using a rogue ad network later dubbed BadNews. The apps were benign, but the malicious ad networks was designed to push all fraud malware targeting Russian speaking users through this apps.

In Asia, similar type of attack involved using a rouge ad network to push malicious code through other apps without being detected by mobile antivirus vendors.

The malicious payload pushed by the ad network runs quietly in the device memory and waits for users to initiate the installation of any other application. At this time, it prompts users to also install and grant permissions to the malware, appearing as if it's part of the new application's installation process.

This is very decent approach where end users does not need to do anything wrong. Once the malware installed, is has ability to interact and hide received text messages, as well as to send text messages in order to sign up users for premium rate mobile services, Palo Alto Networks said in a description of the attack sent via email.

Bogdan Botezatu, a senior e-threat analyst at antivirus vendor BitDefender, said that, this malware is based upon geographical region. They also expects the distribution through mobile ad-network to become more common, especially in countries where mobile devices can't access the official GooglePlay store or where users have difficulties in purchasing applications in a legitimate manner, casing most Android device to be configured to accept APKs(Android Application Packages) from unknown sources.

Google Play checks APKs for malware before approving them, so getting an infected APK uploaded there can be very hard, Botezatu said. Continue with their thought that users are more likely to fall victim to "malvertising" --malicious advertising --attacks launched through mobile apps than Web browsers. 

So, Android users should make sure that their devices are not configured to allow the installation of apps from unknown sources and should run a mobile antivirus product, which might be able to detect malicious apps delivered through ad networks.

Tips :
1) Don't install app outside the Google Play store
2) Always install antivirus.
3) Clear your browser cache memory (Your surfing data store into this memory)
4) Don' install other app store which allows malware app to be installed.
5) Before installing apps check it out properly. 

1 comment:

  1. Hello Rutvij, I work for AdBuddiz and saw that we were quoted in this article. I know you don't refer specifically to us in your post however I would like to take the opportunity to remind your readers that we have always been 100% clean and Google compliant. Contrary to some of our competitors in the field, we have never served any malware through our ads and have always communicated about the clean and non intrusive aspect of our solution. Feel free to reach me if you or your readers has any questions about AdBuddiz ;-) My email is