Fake Flash Player Malware Targets Android Phone Users

Cybercriminals have been regularly upon the surveillance to have the quick sire from gullible marks. Web sites which need Flash Player to be noticed scrupulously mostly uncover the prompt to implement the plug-in. However, this should not be accepted, as it might not be what it seems. Instead, the plug-in should regularly be performed from central sources, such as the Adobe website itself.

Trend Micro has detected an putrescent website hosted upon the Russian domain which offers to implement Flash Player, claiming it to be concordant with all Android versions to assistance captivate people in. However, it instead links to an additional URL to download the antagonistic .apk record which contains the malware-laced chronicle of the Flash Player plug-in which Trend Micro has called ANDROIDOS_BOXER.A. This malware rips off the user by promulgation texts to reward numbers but the user’s permission, which can price the plant around $ 10 the pop.

The infographic next shows the image of Android threats. Click here to arrangement the incomparable chronicle of it – there’s no malware cargo you guarantee you!

Upon serve investigation, you have seen the garland of URLs which have been hosted upon the same IP as this sold website. Based upon the fixing alone used in these URLs, it appears which Android is the the one preferred aim for cybercriminals at the back of this scheme.

Trend Micro

tags: Adobe Website, aktualnosti.net, Android, Apk, Boxer, Fake, Flash, Flash Player Plug, h, Infographic, Ip, Lookout, Malware, News, phone, Phone Users, Player, Premium Numbers, Promise, Rips, Sites Flash, Snapshot, Target, targets, Texts, Trend Micro, Urls, users, web