Skip to main content

Godless:A Malware makes android vulnerable

Reports of Trend Micro suggesting that a new type of malware now around for Android devices.These malware family apps are termed as Godless.Android devices are vulnerable to this godless malware.
These vulnerability leaves 90% of Android device under malicious problem.
So,Basically these malware apps are also found on Google Play which is said to be a safe spot for downloading apps.

What godless do?
Once the godless malware app is installed into the devixe,it runs as a background service and waits until the device's screen goes off.Once the device screens gets off,these apps uses some various exploits to root the device.After rooting,it corrupts the System coding and damages the device runtime.So,this leads to bricking of device which makes phone impossible to use.These apps are using an exploit file ANDROIDOS_GODLESS.HRX which has malicious code.
Which devices are vulnerable?
The devices running Android 5.1 Lollipop or lower versions are vulnerable to this godless malware.
What to do?
Many high end or flagship devices of Samsung,Sony,LG,HTC,Huawei,Xiaomi,Google,OnePlus are running Android 6.0 Marshmallows.Even Samsung  is rolling out Android 6.0 update to its devices.ZUK,WileyFox running Cyanogen OS so they will be kept updated by Cyanogen,Inc.Micromax devices are about toget Android 6.0.YUPlayGod's devices Yureka,Yureka Plus,Yuphoria,Yunique,Yutopia and Yunicorn will be updated to Android 6.0 soon.So,the first thing is to get updated with Android 6.0 Marshmallows to secure against these malwares.

Comments

Popular posts from this blog

Denesh Techs - Double Locker Ransomware

Double Locker Ransomware attacks android device by changing the device PIN and encrypts all the user data.It uses AES(Advanced Encryption Standard) for encrypting the files in the phone which are nearly impossible to decrypt without the key from the hacker.These Ransomwares are distributed through the fake adobe flash player apps or any other fake android apps.Once the app gets installed,The app prompts the user to activate device administration rights.When user unknowingly allows the permission,Then it starts its process.It encrypts the files by wrapping the data under ( .cryeye ) extension.Then it sets the app as default launcher.Whenever,the user unknowingly pressing the home button each time,the ransomware process running in the background triggers and changes the PIN and locks it immediately. The only way to recover the device from Double Locker is to factory reset the smartphone.If the device is rooted,without factory resetting the phone,The PIN can be reset and the datas ca