麻豆蜜桃精品无码视频-麻豆蜜臀-麻豆免费视频-麻豆免费网-麻豆免费网站-麻豆破解网站-麻豆人妻-麻豆视频传媒入口

Set as Homepage - Add to Favorites

【orucken porno izlemek.orucu.bozar mi】Enter to watch online.'Agent Smith' Android malware infected 25M devices

Source:Global Perspective Monitoring Editor:knowledge Time:2025-07-03 17:30:43

A new strain of Android malware has infected 25 million devices and orucken porno izlemek.orucu.bozar mimodified legitimate apps with a malicious ads module, according to a report by the security company Check Point.

It's believed the malware originated from a Chinese internet company that helps Chinese Android developers publish and promote their apps in foreign markets. The malware was disguised as Google-related updaters and "vending modules," which hid its own app icons and automatically replaced already-installed legitimate apps with its own version without the user knowing. This lead the researchers to name the malware "Agent Smith" because its behavior is similar to the character in the film The Matrixof the same name.

The malware first appeared in popular third-party app store 9Apps and targeted mostly Indian, Pakistani and Bangladeshi users. However, of the 25 million affected devices, 303,000 infections were detected in the US, and 137,000 in the UK.

Mashable Light Speed Want more out-of-this world tech, space and science stories? Sign up for Mashable's weekly Light Speed newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!

Apps that were modified include WhatsApp, Opera Mini, Flipkart, as well as software from Lenovo and Swiftkey. The malware detected which apps were installed, patched them with a malicious ads modules, and then re-installed them on the device. For the user, it simply looks like the app is being updated as expected. Once the update is complete, the owner of the malware can then profit from the newly included ads.

Check Point believes the same malware could also be used for more malicious purposes such as credit card theft, with the company's report stating, "due to [the malware's] ability to hide its icon from the launcher and impersonates any popular existing apps on a device, there are endless possibilities for this sort of malware to harm a user's device."

The security firm says they submitted data to Google and law enforcement agencies, and as of publishing no malicious apps remain on the Play Store. Nevertheless, the malware managed to survive for as long as it did because, despite the original vulnerability Agent Smith was based on being patched in Android years ago, developers did not sufficiently update their applications.

Malware like this, "requires attention and action from system developers, device manufacturers, app developers, and users, so that vulnerability fixes are patched, distributed, adopted and installed in time," Check Point says.


Featured Video For You
Security flaw in Zoom allows website to turn on your Mac's camera without consent

Topics Android Cybersecurity

0.2169s , 8193.515625 kb

Copyright © 2025 Powered by 【orucken porno izlemek.orucu.bozar mi】Enter to watch online.'Agent Smith' Android malware infected 25M devices,Global Perspective Monitoring  

Sitemap

Top 主站蜘蛛池模板: 狠狠操夜夜 | 国产综合美国十次里 | 亚洲伦理 | 无遮无挡爽爽免费视频A片漫画 | 国产一级内射视频 | 中文字幕韩国三级理论无码 | 国产精品免费精品视频 | 欧美中文字幕日韩在线 | 奶在线播放 | 亚洲学生妹在线水多 | A片做爰高潮过程免费观看网站 | 久久久久久国产精品无码 | 熟妇人妻系列aⅴ无码专区友 | 亚洲图片一区二区三区四区在线看 | 91红桃 视频 | 国产高潮流白浆喷水免费视频 | 中文字幕韩日精品 | 曰本一区二区伦理片 | 丰满的瑜伽老师bd三级 | 91成人国产九色在线观看 | 欧美午夜电| 国产人妻精品一区二区三水牛影视 | 国产午夜在线播放视频 | 911精品国偷自产在线观看杏吧 | 成人精品国产一区 | 国内美女91福利在线观看 | 九七电影网 | 日韩无砖专区中文字幕 | 国产美女全黄a一级视 | 97亚洲狠狠色综合久久 | 国产青榴视 | 亚洲av大片 | 日韩一本之道一区中文字幕 | 尤物网址在线观看 | 欧美人妖视频网站 | 日韩欧美日韩图片一区 | 伦理影院在线看 | 亚洲日本中文字幕天天更新 | 国产又粗又猛又爽的视频。 | 国产伦码精品一区二区 | 国产艳福片内射视频播放 |