When it comes to viruses, the mobile world is seemingly more sensible than the one of the desktop, even though the infection can be caught harder. In this case, sensibility is seen as a way of doing damage onto the host device, or even to its owner payroll. Now, as AVG claims in its latest threat report, Android is the most affected platform of the mobile world, with hundreds of malwares spreading like fire between legit applications, even as we speak.

Android, the safe haven of exploiters

AVG speaks about Android in its second quarter threat report, where besides the usual desktop talk, the most spread mobile operating system has been analyzed. Although the report doesn’t actually address other competitors, such as iOS, AVG find Android to be targeted by more and more hackers in the past period.

It’s yet uncertain if the mobile OS from Google has a tendency of inviting exploiters right in, but due to the fact that the platform is spread worldwide, it allows users to root it and applications ask for permissions in a way that the user might not give it the deserved attention. Android might soon become an evergreen market for malwares, even for those with security apps installed.avg-antivirus-220x300

In their investigation, AVG speaks about a malware called DFKBootkit, which can be mostly encountered in a 3rd party application market found to be used by Chinese people. The malware finds his way inside Android devices by exploiting not the hardware or software, but simply the carelessness of people.

When an application is preparing to be installed, the market asks the user for permissions. Amongst these permission, several vital aspects may be included which are not taken in consideration by the user and allow the bug to function. A short list of these harmful permissions:

  • Services that cost you money: directly call phone numbers, send SMS messages
  • Your messages: edit SMS or MSS, read SMS or MMS
  • Phone calls: intercept outgoing calls, modify phone state, read phone state

Malwares inflict major damages on mobiles

Once the malware gains access to one of the features listed above, the phone turns into a walking zombie that does every wish of the exploiter and may charge the owner, without its knowledge. Usually, hackers take care when it comes to a user bill, so their profit comes by making small charges to thousands of users, instead of the other way around. This renders the whole exploit process almost untraceable, unless you know how to detect Trojans on Android.

The only thing left to be done, except the installation of a protecting anti-virus of course, is the use of Google Play exclusively and a complete read of the app permissions.

Also Read:
Feature Writer

Alex holds an engineering degree in Telecommunications and has been covering technology as a writer since 2009. Customization is his middle name and he doesn’t like to own stock model gadgets. When he’s away from the keyboard, simpler things like hiking, mountain climbing and having a cold drink make his day.