Malware Alert, Don't Download Android Super Mario Run APK

Be careful: Android Super Mario Run is actually Malware; Do not install it. The game Super Mario Run is loved by all, elders, adults, and young people. The game has been released on iOS, but not on the Android operating system yet. Android device owners have been eagerly waiting for the game to be released so they can enjoy it while on the go. We know that Android users are in abundance all over the world and Super Mario is a game that is popular across borders. Therefore, it is not surprising that when users discovered that the Android game version is now available, they were quick to download it.

Malware Alert, Don't Download Android Super Mario Run APK

But the Android version of Super Mario, which is available in third-party Android apps stores, is actually a fake application containing malware. There are not a single, but diverse applications that float in untrustworthy application stores. One of the applications is called Super Mario; Gets full control of the device after requesting the edit, read and receive/send text messages privileges and go as far as capturing images and videos, along with using the phone's GPS to track your location.

The news was broken by Trend Micro, a Tokyo-based IT security firm, which identified that its security research team has discovered malicious applications of the Super Mario game about 90,000 times in 2016. However, the company claims that Such games applications Super Mario State around since 2012 but, due to the fact that there is news about the Android version of the game release sometime in 2017, the frequency and number of these malicious applications have been doubled.

This is the percentage of users who have downloaded fake applications of Super Mario games on their Android devices:

Indonesia 41%, India 33%, Mexico 8%, Japan 4%, Philippines 3%, United States 2% and other 9%.

The application mentioned above is one of the infected applications that prompts users to install an update called 9Apps, which requests additional rights such as audio recording, access to the SD card and changing calendar entries.

This particular application also offers an imitated version of the actual NES Super Mario Bros., game. However, according to Super Mario analysis, the application also shows "unnecessary icons, pop-ups, banners [and] installs other applications and performs other intrusive activities without any user input."

If you click on any of the ads shown, the applications will redirect you to other websites or adult websites that will try to install other applications on your device. It goes without saying that these new applications will be loaded with other malware that will then request administrative privileges on your device.

It is recommended to avoid downloading any third-party app and just rely on official stores like the Google Play Store. Also on your android device, click Settings and uncheck the box "Unknown sources" if it is enabled.

Remember, this is not the first time cybercriminals are using a famous gambling application to infect informed users. A few months ago, the Pokémon Go application was also used to infect those who were looking for their Android application days before its official launch in the Google Play Store.

Dirty Cow Android Flaw Not included In Google Nov Security Update

Android security November update an update for the bugs and security flaws but "dirty cow" Linux flaw does not include in the update by Google. Last month, the Linux security researcher, Phil Oester, discovered that a Linux kernel bug 9 years old (CVE-2016-5195) "Dirty Cow" is seen infected many android users. Google had to correct this - after all, Android uses the Linux kernel - with its latest security updates, but as it turns out, the search giant has set aside the old important flaw to fix with its security updates dated for November.

Dirty Cow Android Flaw Not included In Google Nov Security Update

Android Security November Update fixes 15 critical flaws associated with the platform, but surprisingly, this vulnerability discovered by Oester has not yet found a solution. The extent of the danger of this vulnerability can be understood by the fact that it can give root access to a device to the attacker in just five seconds.

"The exploit is trivial to run in nature, never failed and probably been there for years - the version I got was compiled with GCC 4.8," said Oester last month. The bug was initially updated 11 years ago, but the update was subsequently canceled in another update.

Threatpost Kaspersky Lab reported that, although the main setting in Android security update for November does not include a fix for the Dirty Cow Flaw, Google released another patch for pixels and Nexus devices. He added that Samsung also launched a solution for its mobile devices. Google will present the Patch for Dirty Cow Android in the Android Security Update of December.

According to the side of this decision, the operation of these errors leaves no trace. This type of disruption makes it still dangerous because the users will not be aware even if their security has been compromised.

Svpeng Android Trojan Hacked 3 Lakh Android Phones Via Google Adsense

Almost 3,18,000 Android phones have been hacked via Google AdSense vulnerability. Kaspersky Lab, an international provider of IT security and antivirus in Moscow and operated by a holding company in the UK, said on Tuesday that they discovered a change in the mobile Svpeng Trojan horse hidden in the AdSense advertising network of Google.

"Since mid-July, Svpeng has been detected in Android devices by about 318,000 users, with infection rates reaching 37,000 victims with the intent of being in a day. The attacker discovered the map information to steal banking and personal data, hackers are using a bug in Chrome for Android. Kaspersky Lab said in a statement that the bug was corrected by Google.

Svpeng Android Trojan Hacked 3 Lakh Android Phones Via Google Adsense

The first known case of an attack of Svpeng android trojan with Chrome Android Bug came in mid-July in a news magazine in Russian, said the antivirus manufacturer, adding that the Trojan virus downloaded itself silentently when an Android user visted a website.

The infecction started from an infected ad placed in Google AdSense. The ad appears "normal" on uninfected phones, the Trojan will only download when the user accesses the page through the Chrome browser on an Android device.

"Svpeng disguised himself as a major upgrade to the browser or the popular application to convince the user to approve the installation.When the malware launches itself, it disappears from the list of installed applications, and asks the user for admin rights. When the malware gains admin rights it becomes more difficult to detect. Kaspersky, adding that the attacker had found a way to avoid some of Google's most important security features for Google Chrome.

Under normal circumstances, when an APK file is downloaded from a mobile device through an external link, the browser displays a warning that a potentially dangerous object is being downloaded. In this case, fraudsters found a vulnerability that allows APK files to be downloaded without notification to users. After detecting the error, Kaspersky Lab reports the problem immediately to Google.

The patch will be released in the next update of Google Chrome for Android, according to the company.

"The Svpeng case reaffirms the importance of collaboration between entreprises.Nous a common goal to protect users from cyber attacks, and it is important that we work together to achieve this objective and thank Google for its quick response. "We also encourage users to avoid downloading applications from untrustworthy sources and be cautious when it comes to what permissions they are asked to give and why," said Nikita Buchka, a malware analyst at Kaspersky Lab.

The Trojan Svpeng Mobile Banking malware is designed to steal credit card information. It also captures call histories, text and multimedia messages, browser bookmarks, and contacts. Svpeng is mainly attacks the Russian-speaking countries, but it has the potential to spread worldwide. Because of the specific nature of the distribution of malware, millions of web sites around the world are in danger as many of them are using AdSense ads network.

A New Malware App is Targeting Mobile Banking and Payment Apps in US and Europe

The latest Android malware applications targeting mobile banking in Europe and the United States. The latest Android malware bugs targeted the 94 different applications of mobile banking and payment apps  including American Express, PayPal and Santander, according to the reports of different media.

A New Malware App is Targeting Mobile Banking and Payment Apps in US and Europe

Fortinet, a company which produces and markets cyber security software was first to discover the virus that represents as a Flash Player application. The malware in question gains the full administrative rights of an Android phone when you press the activation button of the android malware during installation. The malware then runs in the background and waits until the owner opens the applications of mobile banking and payment.

The bug affects Android smartphones in Europe and the United States.

According to media reports, the malware also targets social media applications such as Facebook, LinkedIn, Twitter and Snapchat. The Trojan can also intercept SMS messages.

HummingBad Malware infected 10 Million Android Phones, Secure Your Android Devices

HummingBad malware: Chinese malware infected 10 million Android devices. Experts estimate that more than 10 million Android devices were infected worldwide by a malicious software of a Chinese company.

Cyber security specialist Check Point, the malicious program called HummingBad followed since its discovery in February and there was an increase in the number of infected devices across the world.

HummingBad Malware infected 10 Million Android Phones, Secure Your Android Devices

In a new report, Check Point said the malware a multi-stage attack chain and gets infected by two main components, the first malware infection take place when people visited certain websites with their android phones.

"The first component attempts to gain root access to an android device with a rootkit [software] that exploits multiple vulnerabilities. If successful, the attacker gets full access to a device", according to the reports.

"If the root fails, a second component used to upgrade from false notification system, fooling users to gain full system level permission by the HummingBad malware.

According to Check Point, a mobile otherwise legitimate advertising agency based in Beijing Yingmob is responsible for malware.

"Yingmob has several development teams for legitimate displaying and monitoring platforms. The team is responsible for the development of this malware, consisting of four groups with a total of 25 employees", according to the report.

The analysis of cyber security company Yingmob Details used malicious software to generate advertising revenue through fraudulently forced download applications, and click ads. The company is earning as much as $A402,000 per month with the help of this android malware.

"Yingmob can be the first group to which exposed of spreading such type of android malware, but certainly not the last", according to the report.

The good news is that it is probably less than 100,000 android devices in Australia that are infected with HummingBad malware.

How to know if you have infected with HummingBad malware?


Fortunately, the malware is now known to cyber expert and can be protected with the help of a good phone protection software that easily recognizes the malware infection.

Other options include checkpoints app ZoneAlarm, 360 Security AntivirusBoost , Avira Antivirus Security and a variety of other options.

Scanning with antivirus software quickly detects the malware and notify the user of bad pieces of apps in your device.


What to do if you have infected with HummingBad malware?


Although, malware has less than 100,000 infected android devices in Australia but it should be removed soon after infection.

Fortunately, there are some methods to achieve this.

The first option is a bit difficult task of finding the source of malware and remove that manually from the device.

The other option is a little awkward by factory resetting the phone.The factory reset option is the best choice to remore malware and viruses from android devices for those who don't know much about android os or non-tech person.