Loapi malware enable to of destroying Android phones

collected by :Maya Tony

It has an ad module, a texting module, a web crawling module, a proxy module and a module for mining Monero. Loapi, which may have been created with the same cyber thugs responsible for the 2015 Android malware Podec, is distributed on third-party application stores. Loapi malware modulesOne Loapi module is for spamming advertisements, opening several URLs, involving pages in common social networks such as Facebook or Instagram, as well as for displaying videos advertesment and banners. The proxy module could be used to launch DDoS attacks, and the mining module forces the Android to mine for Monero. Loapi destroyed an Android in two daysThe investigators showed the test Android used the time analyzing the malware.


Currency-mining Android malware is very aggressive it could physically harm phones

Its biggest offense: a surreptitious cryptocurrency miner that's very aggressive it could physically damage an infective phone. The module allows the malware creators to geneaverage new coins with leaching the electricity and hardware of infective smartphone owners. Kaspersky laboratory investigators tested Loapi in a laboratory setting. On Tuesday, officials at AV provider Sophos formally labeled all cryptocurrency mining without user consent as parasitic. "We've never seen such a 'jack of all trades' before," Kaspersky laboratory investigators wrote.

Currency-mining Android malware is so aggressive it can physically harm phones

investigators find Android malware which could overheat and damage your smartphone

as informed in Kaspersky laboratory Researchers have found a new type of malware which could overload the battery and in reality warp the phone. investigators alextremely note which the malware was found disguised as a legitimate Programming on further than twenty advertesment advertising themselves as either anti-virus or porn apps. The malware has been distributed as legitimate Programming on the play store and it has alextremely been found on Apple's application Store. While the formal application stores run with both Google and Apple have a stringent validation process, the malicious applications do manage to make their way as adware or malware. Once infected, this 'jack of all trades' malware going to make generality smartphones unusable and going to overload and begain mining cryptocurrencies only after a couple of days.






0/Post a Comment/Comments

Previous Post Next Post