28.3 C
Lagos
Saturday, September 19, 2020

These Scary and Deadly Malware Programs Will Torment Smartphones in 2018

- Advertisement - data-full-width-responsive="false">

The word viruses might not sound new to you, neither will the word malware sound foreign. If you’ve been existing on the planet ever since smartphones became a thing you must have known that these two words don’t sound pretty at all. They are your smartphone’s worst enemies.

- Advertisement -

Malware programs meaning malicious software programs can show up in different forms, such as adware which will cluster your smartphone with ads that you didn’t bargain for, bots which will work like an army of robots deployed to cause havoc inside your phone, Trojan horses, Viruses, and worms. No matter the forms they show up in, they are bound to make using your phone a terrible experience for you.

In this post I want to bring to your notice the two deadliest malwares that are going to be a threat to smartphones this year. I will also use one or two final paragraphs to show you how to avoid getting infected.

You might have experienced the malware that will come into your phone and all they do is slow down your phone, make your phone press itself or even log on play store, download an app, install the app and start using it. There are so many funny characters to different malware but this two are way more than that.

Imagine this scenario; imagine you are talking with your closest friend and he is sitting just in front of you. You kept your phone in front of you and the both of you were discussing something very important that you wouldn’t want a third ear to hear. If your phone has been infected with any of this two malware, and no recording device lying around anywhere, your network is off. Your phone can still record your conversation, take your pictures and send to a third party.

You will be asking, how possible? That’s insane wizardry, right?

The mishap that might cost you so many things, even your life can be possible if your phone has been infected with “dolphin Attack” or “ghost control.”

These two malware programs can grab the opportunities presented by the idleness of your smartphone. It will make use of the microphone, camera, internet, and keypad even when your smartphone is in offline mode.

Hackers can make dolphin attack possible by using your smartphone’s digital assistant like SIRI and Google assistant. According to thehackernews, the technique works by feeding the AI assistant commands in ultrasonic frequencies, which are too high for human ears to pick up but are perfectly audible to the microphone on your smart device. With this, hackers can silently whisper commands into your smartphone’s ears(microphone) to command SIRI, Alexa or Google assistant, forcing them to open malicious websites and even your car, doors and control other smart IOT stuff connected to your phone.

You can’t hear the ultrasonic sounds used by the hackers to hijack your phone because, according to research, your ear can only hear 20kHz while the microphone on your device detects signals above 20kHz frequency.

With dolphin attack, the hacker can show off some hackery on your smartphone which includes;

Advertisement
data-full-width-responsive="true">

Spying, Visiting malicious websites, Injecting fake information (send fake text or emails),

How to prevent attack?

The best solution so far to this attack lies on the shoulders of smartphone manufacturers who have been advised to program their phones to ignore ultrasonic sounds coming with above 20kHz frequency.

On your part, the only thing you can do is to turn off your digital assistant whenever you feel you are vulnerable or at high risk to be targeted, pending when you get an official patch on your phone.

Ghost control –

That leaves us with the second malware, the ghost control. According to a research by analysis.net, about 2.5 million smartphones are under ghost control in Europe and America. It does the same thing Dolphin attack will do by taking control of your smartphone’s camera and microphone.

It will most times take selfie shots and shot videos without your notice and forward it to the hacker who is behind the attack. That will be a lot of privacy being left out on the bare internet space.

Ghost control is a RAT (remote access Trojan).  It hijacks your device functionality, steals information and can be used to perform ransomware attacks where the hackers lock your device up, holding it hostage and requesting a ransom in form of bitcoin payment before they can open it up again.

On a smartphone, the malware masquerades itself as a legitimate or popular app, when you download. Its base64-decodes a string from the resource file and writes it down. This string written down is the malicious Android Application package.

After installation, the wrapper APK will launch a service that will let the main malicious APK run in the background and cause havoc to your smartphone.

To prevent this one is quite easier than Dolphin, just be mindful of the type of apps you download and where you download them from.

- Advertisement -
- Advertisement -

Trending Now

Google’s Fuchsia OS, An Android OS Replacement?

I have always wondered what will happen when we get to Android Z and if Google will start from Android AA or something or...
- Advertisement -

Startimes Subscription Prices, Packages and Channels List in 2020

StarTimes Nigeria is one of the popular cable TV providers in Nigeria. This service is a subsidiary of a Chinese based company...

10 Best Places to Download Bollywood Movies

Do you spend hours watching Bollywood movies as I do? Have you been in search of the perfect sites to download the...

7 Best Offline Racing Games for Android Users in 2020

Are you a real gamer? If you are one, then you will know how exciting it can be to experience the adrenaline rush that...

GB WhatsApp, WhatsApp Plus and OG WhatsApp Tips and Tricks

Checkout the new GB WhatsApp Tutorial. Hello, welcome to WhatsApp Plus, OG WhatsApp and GB WhatsApp tips and tricks. For the sake of this article,...

DStv Channels List, Packages and Prices in 2020

Thousands of people in Nigeria have put their trust in DStv to provide them with the very best of television shows and programs. DStv (Digital...

Best Low Size PC Action Games For Your Old PC/Laptop With Low Specs

Gaming time is one our favorite time and nothing beats the ability to play high-quality games on our PCs but like some of our...

9+ Infinix Phones With Best Camera in 2020

People purchase smartphones for different reasons, and it is no brainer that the camera specifications is one of the features they look out for...

StarTimes Customer Service Contact and Simple Error Fixes

StarTimes has fast become one of Nigeria's most used cable or digital Pay Tv. Despite its vast customer reach, the company has...

How to Fix Home Key, Recent Key and Notification Bar Not Working?

There is a bug in the Android OS that dates back as far as the Lollipop Version and it is one of the most...

GB WhatsApp Pro, OG WhatsApp Pro V8.10 (GB OG Replacements) Latest Version

Good day peeps, the latest GBWhatsApp is here... and it is called the GB WhatsApp Pro Remember earlier, GB Mods the maker of GB WhatsApp...
- Advertisement -

Related Posts

7+ Photo and Document Scanners for Android

As a student or business person, you may sometimes need to scan documents, notes, receipts of business tractions, pictures or passport. There are apps...

PSP Console: Everything You Need to Know

The PSP console is one of the great sources of entertainment for kids while growing. The PSP console is enjoyed by kids...

macOS 11 Big Sur: Release Date, Name and Features

It is official that macOS 11 Big Sur has just been introduced and is on its way to the public. Recently announced...

The Microsoft Windows Sandbox Feature For Testing Suspicious Apps And How To Activate It

Microsoft is set to give users more security options as the tech company tries to introduce the Windows Sandbox feature. The feature is set...

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.