By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    Cross-Site Scripting: The Real WordPress Supervillain
    Cross-Site Scripting: The Real WordPress Supervillain
    12 months ago
    Hackers targeting your smartphone
    12 months ago
    Improved Version of CTB-Locker (Onion Ransomware) Emerges
    12 months ago
    Latest News
    Beware of scammers! Dangerous apps in the App Store
    2 days ago
    How To Limit Login Attempts on WordPress (+ Should You?)
    3 days ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (September 18, 2023 to September 24, 2023)
    3 days ago
    Two privilege escalation vulnerability in Simple Membership Plugin
    4 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Cloudflare Notification about increase in ransom DDoS threats
    12 months ago
    Windows 11 build 25169 outs with new features
    12 months ago
    How to enable Bluetooth on Windows 11
    12 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    8 months ago
    Now you can speed up any video in your browser
    8 months ago
    How to restore access to a file after EFS or view it on another computer?
    8 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    9 months ago
  • How To
    How ToShow More
    Detecting zero-days before zero-day
    Detecting zero-days before zero-day
    23 hours ago
    See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan
    See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan
    23 hours ago
    Network performance update: Birthday Week 2023
    Network performance update: Birthday Week 2023
    23 hours ago
    Cloudflare now uses post-quantum cryptography to talk to your origin server
    Cloudflare now uses post-quantum cryptography to talk to your origin server
    2 days ago
    Privacy-preserving measurement and machine learning
    Privacy-preserving measurement and machine learning
    2 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    Free stickers “U-Like” Vkontakte
    12 months ago
    Fingerprint on Galaxy S10 can be bypassed with a screen protector
    12 months ago
    Automatic data backup in Android
    12 months ago
    Latest News
    How to enable extensions for Google Bard AI
    2 days ago
    Window 11 Copilot: 10 Best tips and tricks
    2 days ago
    How to create AI images with Cocreator on Paint for Windows 11
    3 days ago
    How to install September 2023 update with 23H2 features for Windows 11
    4 days ago
  • Glossary
  • My Bookmarks
Reading: Mobile malware masked as porn apps
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Threats

Mobile malware masked as porn apps

Tom Grant
Last updated: 13 October
Tom Grant 12 months ago
Share
4 Min Read

A top safety tip for Android users is to install apps only from the official store. However, there are times when this advice is difficult or even impossible to heed. For example, when it comes to porn, such content is (unsurprisingly) barred from Google Play. Aficionados have to seek out third-party sites for that — and, of course, those sites are populated by scammers.

Contents
The wrong kind of pornMom told you soHow to stay safe

Our researchers studied various “18+” mobile threats. Their detailed report is available here; this article presents a summary of the most salient points.

The wrong kind of porn

Cybercriminals are well-armed when it comes to targeting fans of adult content. They disguise malware as XXX collections and special porn players, add malicious features to official apps from known porn sites, and even set up their own porn portals to spread their dangerous wares. They often promote their creations by hacking or malvertising on legal porn sites, as in the case of PornHub last fall.

Android-based malware that exploits this hot topic has become incredibly popular: In the past year a quarter of all attacks on mobile devices came from porn-related malware. Interestingly, desktop computers are attacked by such malware far less often — criminals are following porn into the mobile space.

Mom told you so

The consequences of porn malware can be nasty or very nasty.

If the victim is “lucky,” they will get hit by an ad clicker. These pests account for about half of all attacks. Victim’s smartphone battery indicator will start dropping noticeably, and the device will gobble up gigabytes of mobile Internet traffic (during the study, one piece of malware “clicked” on 100 megabytes’ worth of ads just in several hours). WAP and SMS hacks are in roughly the same weight category: Users are unwittingly signed up for paid services or content, with SMS confirmations deleted for good measure, or calls are made to paid numbers.

Losing money from a mobile account is actually getting off relatively unscathed — far worse beasts lurk in the Android malware zoo, and they collectively account for the other half of porn-related attacks. For example, a Trojan banker disguised as an alluring app can steal your login and password and clean out your bank account, and Trojan ransomware will block your device and demand a ransom.

Cybercriminals count on the fact that victims understandably prefer to keep quiet about how they encountered such Trojans. To intensify the effect, an on-screen message might appear about illegal content supposedly detected on the device — for example, child pornography.

Loapi — this Trojan is hot!

In some cases, the malware is a kind of modular infection like Loapi, which starts off with ad clicking but might progress to blocking the smartphone or even frying the insides through cryptomining.

Finally, it’s worth noting another very serious type of malware — the rootkit. A rootkit gives cybercriminals full access to the smartphone. It’s an all-in-one threat that can show advertising, steal data, and secretly install other apps, including more malware.

How to stay safe

The best advice is not to download any porn apps. That said, for those inclined, there are safer ways to view adult content.

  • Keep an eye on what permissions an app requests. For example, avoid media players that request full access to the operating system.
  • Install a mobile AV product to protect your devices against uninvited guests.

Source: kaspersky.com

Translate this article

TAGGED: Google Play, Malware, RC4, Rootkit, RTF, Threat, Threats, Trojan
Tom Grant October 13, 2022 October 7, 2022
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Detecting zero-days before zero-day
Detecting zero-days before zero-day
Apps 23 hours ago
See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan
See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan
Apps 23 hours ago
Network performance update: Birthday Week 2023
Network performance update: Birthday Week 2023
Apps 23 hours ago
Cloudflare now uses post-quantum cryptography to talk to your origin server
Cloudflare now uses post-quantum cryptography to talk to your origin server
Apps 2 days ago
Privacy-preserving measurement and machine learning
Privacy-preserving measurement and machine learning
Apps 2 days ago

You Might Also Like

Detecting zero-days before zero-day
Apps

Detecting zero-days before zero-day

23 hours ago
See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan
Apps

See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan

23 hours ago
Cloudflare now uses post-quantum cryptography to talk to your origin server
Apps

Cloudflare now uses post-quantum cryptography to talk to your origin server

2 days ago
Threats

Beware of scammers! Dangerous apps in the App Store

2 days ago
Show More

Related stories

How to upgrade to Windows 11 23H2 with Installation Assistant
How to install September 2023 update with 23H2 features for Windows 11
How to get the latest Windows 11 innovations
How to blur image background in Photos for Windows 11
How to download official Windows 11 23H2 ISO file
PHP Object Injection Vulnerability in Flatsome Theme

10 New Stories

Encrypted Client Hello – the last puzzle piece to privacy
Beware of scammers! Dangerous apps in the App Store
How to enable extensions for Google Bard AI
Reminder: Enable two-factor authentication wherever you have it. This business
​​Know exactly when your data is transferred to GoogleIn a world where our data is permanent
​​Fake correspondence with the iPhone interfaceIn a world where digital communication is
Previous Next
Hot News
Detecting zero-days before zero-day
See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan
Network performance update: Birthday Week 2023
Cloudflare now uses post-quantum cryptography to talk to your origin server
Privacy-preserving measurement and machine learning
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?