Search
Wednesday, December 07, 2022

keep in mind! Alert for virus attacking four cell phone models via WhatsApp

keep in mind!  Alert for virus attacking four cell phone models via WhatsApp

Recently, a malicious program, or malware, was detected that attacks applications of WhatsApp At least four specific cell phone models. These Trojan-type viruses reach smartphones and become privacy threats, as they have access to instant messaging app files and can read chats, send spam, intercept and listen to phone calls. can.

Smartphones that can fall prey to these Trojans There are fake copies of popular brandsSo to avoid this malware attack it is recommended to buy the devices in official stores or reputable sellers.

Computer security company Dr.Web reported that, from July this year, the site started receiving several complaints from users who faced problems with their instant messaging app due to the installation of malicious programs. As a result, the experts at that unit began to investigate and found that the smartphones with these deficiencies were the following: P48pro, Redmi Note 8, Note30u y Mate40.

WATCH: The WhatsApp communities have arrived, but what happened to the camera button?

These models had in common that they were sold as counterfeit copies of popular and reputable cell phone brands. Also, despite being advertised as up-to-date, these smartphones are a . come with The installed version of the Android system which has long been obsolete, 4.4.2.

These tools contain two files through which malware accesses Android, and they are called: “/system/lib/libcutils.so” and “/system/lib/libmtd.so”, which are named after the Libcutils.so object. are consistent. This is known as a system library, which is harmless by design, but modified by viruses., This way, when used by an application, it launches a dangerous Trojan that is embedded in libmtd.so.

when applying whatsapp and whatsapp business Using these libraries, the virus – commonly known as the “back door” because it enters through the “back door” – protects the algorithm by downloading and installing additional malicious plugins or accessories on the phone. attacks systems. These are done from a remote server and users are not able to understand,

WATCH: Do you download apps to your work cell phone without asking permission? Be careful, you can put the company at risk

From that moment on, the Trojan could access files from instant messaging applications that were attacked and Read chats, send spam, listen to phone conversations, and perform other malicious actions, This malware is also designed for Download and install other software on the phone Through scripts, without users’ knowledge.

“The danger of ignoring backdoors and the modules they download is that they work the way they really are” Be part of target applications”, indicates the dr.web page, which adds that a Trojan that performs this type of attack Smartphones Might belong to the Android.Fake.Updates family.

To prevent this type of malware attack, it is recommended Buy smartphones in official stores or recognized companies, It is also important to include in the system and use antivirus, which can be downloaded through Play Store (for Android) or App Store (for iOS systems). Third, there is another suggestion Install updates available from time to time for the operating system,

GDA / Nation / Argentina

World Nation News is a digital news portal website. Which provides important and latest breaking news updates to our audience in an effective and efficient ways, like world’s top stories, entertainment, sports, technology and much more news.

Latest News

Related Stories

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    Thanks for submitting your comment!