Categories: Uncategorized

Malware May Be Lurking on Your Smartphone

The Google Play Store is full of great apps to keep you connected and productive—but something dangerous may be hitching a ride when you download a new app. That’s right: developers have figured out a way to sneak malware into the Google Play Store, and ultimately onto your Android phone or tablet.

Using a crafty code known as “droppers,” app developers hide malware code deep within apps and proceed to attack Android devices in stages. If your phone or tablet is suddenly slow, riddled with pesky pop-ups, or using too much data, you may be the latest victim.

How to detect droppers and protect your device

Droppers are essentially a bait and switch situation: you think you’re getting one thing but wind up getting something entirely different. They’ve been around for years on desktop computers, but now they’re effectively targeting smartphones—most of which don’t use antivirus software.

The original coding of a dropper isn’t meant to cause any harm. Rather, it’s merely a way to gain access so that future downloads can drop harmful malware into your device. Since that original code isn’t threatening, it often passes Google’s security tests when submitted to the Play Store.

Some coders sneakily slap on an additional layer of sophistication, like a timer that will execute the malware in stages based on permissions or usage. Don’t despair, though. You can still save your smartphone. Here are some ways to protect yourself:Do some research on the developer to make sure they’re legitimate and reputable.

  • Read the app’s reviews carefully. Remember that developers can buy good reviews, so pay particular attention to any negative ones.
  • Read the permissions before you initiate the download. Don’t download an app that asks for permissions you’re not comfortable granting.
  • Consider installing a reputable security app to detect threats.

Don’t panic, but stay informed

Cybersecurity firms and researchers have been wise to droppers for quite some time. In fact, research by Avast Threat Labs found that some Android devices actually come pre-installed with these devious droppers.

Needless to say, Google is hard at work finding ways to stop unauthorized attacks on their popular devices. Apple’s App Store puts apps through a much more rigorous testing protocol before making them available for download. The company also prevents iOS apps from downloading, installing, and executing code.

Malware can cause significant damage—and oftentimes, it’s damage your business simply can’t afford. Dropper developers may be smart, but cybersecurity companies like eMazzanti are smarter. We can help keep your devices and data safe through expert consultation, management, and crisis control. Contact us today to learn more.

Bryan Antepara

Bryan Antepara: IT Specialist Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers. Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service. He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

Top 5 Collaborative Tools in Microsoft 365 Drive Productivity and Innovation

In today’s fast-paced digital landscape, businesses cannot thrive without effective collaboration. Microsoft continues its unwavering…

2 days ago

7 Essential Contact Information Tips for Email Signatures to Enhance Your Professional Image

An email signature accomplishes much more than simply telling readers who you are and how…

1 week ago

Maximizing Threat Response Efficiency with Security Copilot

Cyber security professionals work hard to safeguard companies’ information. But with criminals constantly changing their…

2 weeks ago

Why should a firm use DMARC? What is the need?

Domain-Based Message Authentication, Reporting, and Conformance (DMARC) is an e-mail security protocol designed to validate…

3 weeks ago

eCare Cloud Backup is in fashion. It’s the new you!

My job is to manage my law office’s cloud servers here at Justice Freaks.  As…

4 weeks ago

I Think I’m Dating an AI

My worst nightmare would be to date someone who isn’t who they say they are.…

4 weeks ago