Home » today » Technology » Hiddad Trojan: The Rising Threat for Android Devices Revealed

Hiddad Trojan: The Rising Threat for Android Devices Revealed

Hiddad has been terrorizing Android mobile devices since last year, regularly appearing at the top of the list of the most widespread malicious codes. In January, however, it seemed that the ground collapsed after him, he did not make it into the top ten monitored threats at all.

It began to gain strength again only in March, when it immediately rose to the third place of the most widespread threats with a share of 9.59%. In April, it took first place, its share was 26.54%. In May, security experts already reported a record share of 49.94%.

Currently, its share among other detected threats is lower, but 29.93% is still enough for the first place in the statistics by a long distance.

Don’t tell your bank. Scammers promise a fabulous valuation, but they rob the gullible

Fake versions of games

“The Hiddad Trojan horse appears in the top spots of the regular threat statistics for the Android platform in the Czech Republic for the umpteenth month in a row. Attackers continue to use fake versions of mobile games that mimic the popular game Minecraft to spread it. In July, it was mostly Block Sun Earth game. Under unofficial copies of these games, users will also find fake reviews,” explains Martin Jirkal, head of the analytical team at Eset’s Prague branch.

The game Block Sun Earth resembles the popular Minecraft, where players build worlds using different parts and cubes.

At first glance, trojanized applications are normal and legitimate games or various tools, but their task is to spread malicious code. “Most often, their authors offer them on various Internet repositories and warez forums, where users are looking for free alternatives to otherwise paid games in official stores or on developer websites,” explained Jirkal.

The main function of the Hiddad malware is to display advertisements, but it can also gain access to key security information contained in the operating system, allowing an attacker to obtain sensitive user data.

Therefore, users can defend themselves against this malicious code relatively easily. Just don’t download apps from unknown and dubious sources. In the event that an uninvited visitor has already taken up residence in a tablet or smartphone, most mobile antivirus programs should be able to deal with it, including free ones.

10 most feared viruses for Windows computers

2023-08-28 15:42:39
#Hiddad #continues #haunt #attack #mobile #phones #News

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.