Unfortunately, new malware is discovered every day. If your phone has been behaving oddly lately, then it’s possible you could have downloaded a malicious app from the Play store. If you’re worried that you may have hidden malware installed on your device, run a quick Security Scan to identify malicious software that can seem invisible. Click here to quickly scan your device for hidden threats:
The Cloak and Dagger Exploit
Researchers at the University of California at Santa Barbara and Georgia Institute of Technology recently discovered an Android exploit that allows hackers to view users’ screens anonymously, enabling them to view and steal private information such as passwords, bank information, and other sensitive details. The four researchers called the exploit “a series of vulnerabilities and design shortcomings affecting the Android UI” on their website, cloak-and-dagger.org.
If you’ve been a victim of Cloak and Dagger, you’re not alone. The researchers performed a study with 20 subjects, and none were able to identify or diagnose the malicious attack. This is because the virus “clones” your Android’s design, or UI, to appear identical to an unhacked system.
Cloak and Dagger appears to be normal in the Play store, so unlike some viruses, it does not show obvious signs of malicious intent. The researchers further stated that the user will not be able to visually detect the hack once it is on the phone, since it does not require permission for installation. Once the malicious software is installed, Cloak and Dagger is able to record the user’s keystrokes. This means that the hacker can view everything a user types on the screen and record it without the user’s knowledge or permission. Additionally, the researchers found that Cloak and Dagger, once installed, can silently install a “God-mode app” that allows the hacker to completely take over a phone’s functions.
As malware becomes stealthier and more complex, it becomes harder to detect. To ensure that your information remains private, perform a malware scan with Security Scan. It’s a simple and efficient way to continue browsing securely.
Learn all about one of the hackers' favorite breach method and keep your company safe…
Have you ever wondered how to recover deleted photos on Android? After all, the lack…
Digital worms are among the most serious threats in the wild kingdom of the Internet.
Spoofing is a fairly sophisticated virtual scam that can fool even the most cautious and…
Five Steps to Reduce QR Code Risk! Step one? Read this article…
Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming…