All systems are at risk of being infected by some variety of malwares. It does not matter what operating system we use or what equipment it is. What we can say is that where there are more users, it is usually where cybercriminals set their sights and create more threats. An example is Android, which in recent years has become the most used operating system on mobile devices and, also, bringing together all platforms and that is why mobile malware has grown so much and we will see some of these that are the most viewed:

▸xHelper

Malicious Android app that was first discovered in March 2019. It is used to download other malicious apps and display ads. The application is capable of evading mobile antivirus programs, as well as reinstalling itself in case the user removes it.

▸Necro

Necro is a dripping Android Trojan. It can download other malware, display intrusive ads, and steal money by charging paid subscriptions.

▸Hiddad

Malware for Android, its main function is to display ads. However, you can also gain access to key security details embedded in the operating system, allowing a cybercriminal to obtain sensitive user data.

What measures to take against these mobile malware


That is why we must take concrete measures to avoid these mobile malware. Perhaps the main thing is to pay close attention to where we download the programs. We have seen the case of Hiddad and how it hides malware in applications that it introduces in third-party stores.

Therefore one of the first premises is to only go down from official stores. This way we can ensure that there is no hidden malware or modified applications. It is a mistake to download insecure pages.

It is also very important to have security software. In this way we can protect our equipment against possible threats. There are many antivirus for Android and other very interesting tools.

On the other hand, both in terms of software and the operating system itself, it is vital that they are updated. In this way we can deal with the latest threats, as well as correct possible vulnerabilities that can be exploited by cybercriminals.


Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *