Souq.com expects to double its sales during this year’s annual event, compared with its 2014 editionNovember 25, 2015 9:59
Mobile Users Face Olympics Scams and Malicious Android™ Applications According to GFI® Software
OpFake and Boxer malware families continue to evolve and infect smartphones and tablets
September 12, 2012 4:16 by sanjeev kant
GFI® Software today released its VIPRE® Report for July 2012, a collection of the 10 most prevalent threat detections encountered last month. In July, GFI threat researchers observed a number of malware attacks targeting mobile users, including fake applications exploiting consumers’ interest in the official app for the 2012 Summer Olympic Games as well as mobile Web browsers such as Firefox® and Opera Mini™.
“Mobile malware is a relatively new frontier for cybercriminals, but that does not mean that their attacks are any less sophisticated or dangerous,” said Christopher Boyd, senior threat researcher at GFI Software. “Many users are not aware of the fact that cybercriminals have created malware specifically for Android devices and are rushing to download apps before ensuring that they are legitimate .”
Just days ahead of the 2012 Summer Olympics opening ceremonies in London, GFI researchers uncovered Russian websites hosting Trojans posing as the London 2012 Official Mobile Game app. The websites were designed to mimic the official Google Play™ app market in order to trick users into downloading the application. GFI also discovered a spam email campaign falsely promising victims a chance to win free airline tickets to the London Olympics in exchange for filling out a survey and supplying personal information.
Users also encountered a phony version of Firefox for Android exploiting the recent release of the official web browser on Google Play in June. The application is part of the Boxer malware family, which normally tricks users into agreeing to send premium SMS messages before directing them to the official Firefox website. This version of the app goes a step further and installs the application without notice, covertly sends premium SMS messages and directs users to the Google™ homepage. GFI researchers believe that this may be a tactic used to convince users that the app was not installed properly, thus returning to the scam website and going through the process multiple times.
Mobile users interested in the Android version of the Opera Web browser were in danger of coming across the OpFake family of Trojans, which often pose as the Opera Mini application. Like victims of the Boxer Trojans, users who fell for this scam had their phones send SMS messages to premium-rate numbers without their knowledge. The version of OpFake uncovered by GFI also installs the real Opera Mini Web browser in order to trick users into thinking that they have installed the correct application. Victims of this scam would not realize anything was amiss until they receive their monthly phone bill.
Secure Smartphones and Tablets
GFI Software recently released GFI VIPRE® Mobile Security Premium, one of the most comprehensive mobile protection applications for Android phones and tablets. The app combines GFI Software’s award-winning VIPRE antivirus technology with lost device features, parental controls and automatic backup capabilities. This powerful combination enables consumers to use their devices freely without having to worry about mobile viruses, identity theft, data loss or unsupervised activity. To learn more about GFI VIPRE Mobile Security Premium, visit www.vipremobile.com.
Top 10 Threat Detections for July
GFI’s top 10 threat detection list is compiled from collected scan data of tens of thousands of GFI VIPRE Antivirus customers who are part of GFI’s ThreatNet™ automated threat tracking system. ThreatNet statistics revealed that adware dominated the list, taking half of the top 10 spots.
September 12, 2012 | News
September 12, 2012