vírus – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png vírus – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[Hidden Cobra Malware Infects Android Phones]]> https://www.psafe.com/en/blog/hidden-cobra-malware-infects-android-phones/ Thu, 05 Apr 2018 12:00:43 +0000 https://www.psafe.com/en/blog/?p=17245 The U.S. Department of Homeland Security and Federal Bureau of Investigation (FBI) are warning Android phone owners of two new Hidden Cobra malware that’s believed to be engineered by the  North Korean government. Avoid being infected with these malicious files by using DFNDR Security’s Full Virus Scan protection.


This feature monitors any threats on your device, including scanning your memory and SD card for malware or viruses. Try it out and read further to learn more 
about the Hidden Cobra group — also known as Lazarus Group — and this strain of malware.

Read More: Dangerous New Android Malware Discovered

What This Malware Does to Androids
The two pieces of malware are known as HARDRAIN and BADCALL and they are capable of installing a remote access tool (RAT) payload on Android devices. The technology can make the affected Windows systems work as a proxy server that can gather information from your device.

The Hidden Cobra viruses can record your phone calls, take over your camera and take screenshots of your device, read data from the contact manager, download and upload data from your device, plus it can execute commands and check for open Wi-Fi channels. Hackers can later use this information to blackmail you as it gives them the capabilities to make your personal information public.

HARDRAIN: Part One
The two federal departments wrote that HARDRAIN is comprised of three executable files that install malware on your Android device. Two of these are dynamic link library (DLL) executables that alter your Windows Firewall in order to allow incoming malicious connections from cybercriminals to breach your device.

In essence, these files open up the door for malicious files masked as secure HTTPS sessions that appear to be legitimate to enter your device. The third file on HARDRAIN is an Executable Linkable Format (ELF) file that links up to hard-coded IP addresses and serves as a RAT program, paving the way for a further invasion of your privacy and exposing your personal data.

BADCALL: Part Two
The other piece of malware is BADCALL, which also uses three files to tap into your phone. Two of these are also Windows executables that disarm your firewall by altering a registry key. After doing so, BADCALL also turns the infected systems into proxy servers. These files allow illicit communication channels to reach your device in the form of encrypted HTTPS traffic.

Rounding up the three files that make up BADCALL, there is an Android Package Kit (APK) that also acts as a RAT program that can access your personal information, record sensitive conversations, capture text messages and screenshots through your device’s camera.

]]>
<![CDATA[How Do Ransomware Criminals Make Their Money]]> https://www.psafe.com/en/blog/how-do-ransomware-criminals-make-their-money/ Tue, 30 Jan 2018 22:00:50 +0000 https://www.psafe.com/en/blog/?p=16080 Chances are, you’ve seen a news report or have possibly been exposed to a virus or ransomware attack at some point while online. If your phone is suddenly behaving oddly, it’s a good idea to use dfndr security’s full virus scan feature to check your phone for hidden malware. This can help you to quickly remove any dormant or silent viruses that may put your information at risk to hackers:

But have you ever wondered how the perpetrators behind those hacks and programs make their money? By understanding what they do to extort information and earn their money, you can better prepare yourself against future attacks, and know the warning signs to watch out for.

Read More: The Net Neutrality Battle Could Affect Your Access to Netflix

Step 1: Hacking Into the Device
The first step for any hacker is to get access to your device or your information. This can be done through software or through a tracker that has been installed on a sketchy website. It can come from a variety of programs or apps that may be vulnerable — which is one reason to make sure that you constantly update your devices. Once that area has been exposed, it can be identified and targeted for installing the ransomware onto your computer or phone.

Step 2: Extort the Device Back to the Owner
Once installed or hacked, hackers and ransomware criminals will try to extort your information for money, likely by emailing you or demanding a form of payment from you, if you want your data kept safe and restored. An example is a famous case involving the HBO hackers, who demanded money from HBO to prevent them from releasing new Game of Thrones episodes.

Oftentimes, criminals will demand payment in the form of Bitcoin, a digital currency that can’t be tracked, so their information won’t be revealed. This form or ransom payment allows cybercriminals to continue doing this to other unsuspecting victims. If you refuse to pay, oftentimes it isn’t worth it for the criminals to continue extorting.

With the knowledge of how ransomware hackers make their money, you can take better steps to prepare yourself against attacks and prevent your information and devices from being compromised. Make sure to be aware of how ransomware attacks work and to report to the authorities when you’re being extorted. More importantly, make sure that you browse safely to ensure that you won’t get a virus or malware to begin with by downloading a reliably performing antivirus app. You can have peace of mind knowing that the security of your device has safeguards in place.

]]>
<![CDATA[Dropbox Phishing Attacks Are on the Rise]]> https://www.psafe.com/en/blog/dropbox-phishing-attacks-are-on-the-rise/ Tue, 16 Jan 2018 13:00:32 +0000 https://www.psafe.com/en/blog/?p=16128 Dropbox is a popular program that allows users to quickly store, organize, and share information. It’s used all over the world, and it has what every user wants: the element of convenience. Being able to store and share documents with the click of a few simple buttons is a great thing, but unfortunately — like most tech innovations — it comes with some risks, too. To protect yourself against Dropbox phishing attacks on your Android, use dfndr security’s anti-hacking feature to monitor any navigation whether attached to emails or chat services. Try it immediately:


Once the anti-hacking feature is activated on your device, it will block phishing attempts even before you click on a link, thereby preventing theft of your login credentials.

Learn more below about the rise of Dropbox phishing scams so you can stay aware of how to protect yourself as you use this popular program.

Read More: 5 Phishing Clues to Look for in Emails from Your Contacts

How Do These Scams Work?
These scams are particularly scary because they so closely mimic the way that the program actually works. Once you become familiar with a program, its layout, and the way that it works, it can become tough to question things as you see them in relation to that program. That is how this attack gets people unexpectedly, though.

Users are frequently being sent emails that look identical to something that may come from Dropbox. These messages will come from a spoofed email address that mimics the normal Dropbox address. They will also showcase the exact Dropbox logo, font, and layout that users are so familiar with and accustomed to. These messages may look like they are coming from a contact that you are familiar with, making them even more believable.

Then, when users are lured into clicking on the link, they may be asked to enter a username and password. This gives away your credentials, causing more of an issue. After that, the user will be asked to choose an email provider to “drop” the downloaded documents into after they are downloaded. As you can tell, this issue could allow hackers to receive your Dropbox and email information, which has the potential to expose all of your personal information that they may be able to use for malicious intentions.

How to Combat This Issue
To work against this issue, users should be wary of the link that pops up if they click on the original phishing email. If the URL does not appear as it typically does, or if it has any foreign words it it, discontinue the process of logging in to view the “shared” information. Always follow up with contacts before accessing the data to ensure that they actually sent you something.

]]>
<![CDATA[Online Scams to Look Out for During the Holidays]]> https://www.psafe.com/en/blog/online-scams-to-look-out-for-during-the-holidays/ Wed, 20 Dec 2017 01:00:08 +0000 https://www.psafe.com/en/blog/?p=15926 More than ever holiday shoppers are now choosing to purchase their gifts online rather than at a physical store location. While online shopping is often preferred for its convenience and incredible discounts, it can also be a great hassle if you fall victim to a virus or scam. Phishing attacks, hacks, and malware are all more common during the holidays — since more people are shopping online — and these scams are getting savvier every year. Luckily, there are several ways that you can protect yourself from scams and viruses while shopping online this season. Be on the lookout for these:

  1. Sketchy Emails That Mimic Well-Known Businesses

Scammers love to send out fake emails that mimic the language and images used by well-known companies. These emails often attempt to trick consumers by offering them a free, in-demand item if they enter a contest, or informing them that their account has been breached, which is a false warning meant to take over a person’s account. You should also be cautious of any email attachments, even if they come from seemingly trustworthy sources, such as a coworker or a friend. If an email or an attachment doesn’t make sense, don’t click on it — the person’s account could have been hacked, and the attachment could contain malware. Reach out to the person directly and ask them if the email is legitimate.

Read More: The Most Common Viruses of 2017 and How to Stop Them

  1. Unbelievable Deals? Pause Before You Buy

Fake and malicious ads and websites are especially common during the holiday season. You may see them at the top of Google search results, or on Facebook, Instagram, or another website. They typically advertise absurdly discounted items, such as expensive sunglasses or handbags, laptops, or other in-demand goods for 80% to 90% off. To avoid these types of scams, avoid clicking on any ads or links that seem too good to be true, and consider using an ad-blocker. You should also verify that you are on a legitimate, secure website before entering any information or making a purchase. Lastly, make sure to take advantage of dfndr security’s various protection features like anti-hacking to prevent you from falling victim to any online scams or fraudulent websites.The anti-hacking feature alerts you that a link is malicious and then blocks it before you even click on it.

  1. Shopping Apps With No Holiday Spirit

During the holidays, many more malicious shopping apps crop up. They typically mimic well-known shopping apps or else lure consumers in by promising unbelievable deals. To avoid becoming a victim of malware or scams, avoid downloading apps from third-party websites. Further, exercise caution when downloading apps from the Google Play store, and pay attention to the language used — is it free of typos or other glaring errors? — and pay attention to the number of reviews and downloads. Lastly, when it comes to shopping on your phone, stick with a store’s official mobile website.

]]>
<![CDATA[5 Unknown Phishing Scams to Watch for During the Holidays]]> https://www.psafe.com/en/blog/5-unknown-phishing-scams-to-watch-for-during-the-holidays/ Wed, 20 Dec 2017 00:00:40 +0000 https://www.psafe.com/en/blog/?p=15904 It’s the most wonderful time of the year for spending time with family and friends — and finding great holiday gifts at incredible prices. As you spend more money online and hunt for the best deals, hackers introduce more clever phishing scams to lure you in. These phishing scams go far beyond the more obvious ones, such as a fake email about winning a contest or a Google ad for a discounted luxury item. Here are 5 lesser-known phishing scams to watch out for this holiday season:

An Email That Your Transaction Was Declined
While shopping this season, the last thing you want is for your card to be declined. If you receive an email that says your credit card or PayPal transaction was declined for a recent order, this is a phishing scam. Don’t click on any links or hand over your personal information. If you must check your account or the status of your order, manually type in the correct URL and log in to your account to verify that everything is in okay. You could also download an antivirus app like dfndr security to regularly scan your phone for any malware. The best feature you might want to activate in our app is anti-hacking because during the flurry of a shopping session this feature can identify and block malicious links before you click on them. Turn it on to try it:


Read More: 
Can’t Stop Clickbaiting? anti-hacking Will Protect You

Spoofed Two-Factor Authentication
In this phishing scam, a hacker uses a victim’s phone number and email address to assume her identity and ask Google (or another service) to reset the password for her email account. Whenever Google texts the victim with the reset code, the hacker will then pose as Google to text the victim about unusual account activity, and request that the victim send the hacker the reset code to confirm her identity. If the victim sends the reset code to the fake Google text, then she has just given the hacker the ability to access her account.

Instagram Shopping Scams
Boutique accounts have become incredibly popular on Instagram, with items often selling out within minutes. While there are many legitimate Instagram boutiques out there, you should be wary of shady accounts that try to lure you in by purchasing an item or clicking on a link. Before you shop on Instagram, make sure that the boutique you’re interested in is legitimate by paying attention to the number of followers, the seller’s language, and any reviews or websites that discuss the boutique.

Fake Promotional Emails With Coupons
Maybe you ignore promotional emails altogether, or maybe you check them for the latest sales and deals at your favorite stores. If you receive an email this season that promises an incredible deal, don’t click on any links or images in the email — it could be an email spoofing your favorite retailer. To ensure that the deal is legitimate, check the email’s language, compare the email to past emails, and go to the store’s website to find the deal or contact customer service to verify the email.

Shipping Scams
With this scam, you’ll receive a fake email from UPS or FedEx informing you that your package was unable to be delivered. To remedy this issue, the email will ask you to click an infected link or open a malicious attachment. If you receive an email like this, ignore it — these services will never email you about undeliverable packages. Further, be wary of any odd-looking emails that contain a tracking number — the link could be fake.

]]>
<![CDATA[Protect Your SD Card From Being Compromised]]> https://www.psafe.com/en/blog/protect-your-sd-card-from-being-compromised/ Mon, 11 Dec 2017 13:00:53 +0000 https://www.psafe.com/en/blog/?p=15777 Are you worried that your SD card is at risk of having its files compromised by hackers? It’s a legitimate fear. When dealing with something as personal as your photos or other sensitive files, it makes sense as to why individuals would want to take extra caution. But you shouldn’t stop there. Be sure to implement the full virus scan feature to scan all your Android files and SD card for any malicious activity:


To make sure that all of the data on your phone is protected, the following are some of the best ways to protect your SD card against getting compromised.

Read More: What You Need to Know About Google’s Security Patch Record

Password Protection
One of the best, and oldest, methods for keeping your SD card protected is to enable the password protection feature. This allows you to create a lock that only you will be able to know and use when accessing the storage on the SD card. While this can be a good method, experts have noted that even the best passwords can be hacked, and it can be a tremendous burden to remember or keep your password on you. While it is certainly a good first step towards protecting your SD card, it certainly shouldn’t be the only one that you take.

Locked or Protected Cases
Another popular way to keep your files safe and keep hackers at bay is to keep your files in a locked or protected phone case, which helps to protect your device from weather and other extreme conditions that may leave your files exposed to risk. While this can be helpful for travel or for other traditional senses of security, these methods can leave you vulnerable when transferring or sending your files when you’re online or plugged into the computer.

Encryption Services
Perhaps the most popular — and the safest — way to protect your SD card and the files on it is to employ an encryption service that anonymizes their data, which allows for easy browsing and behavior online. While it was mentioned that there is no foolproof system for protecting your information, this is about as close as it comes to a secure SD card. Your files will be kept anonymized, and hackers — should they be targeting you — will be left unable to do much without a solid anti-encryption software. For most Internet users, employing an encryption service can be like achieving a new state of security and peace of mind for those worried about their SD card being at risk.

]]>
<![CDATA[What is the “Industroyer” Virus and Should You Worry?]]> https://www.psafe.com/en/blog/what-is-the-industroyer-virus-and-should-you-worry/ Tue, 05 Dec 2017 23:00:24 +0000 https://www.psafe.com/en/blog/?p=15564 The Industroyer virus first came to light in 2016 when the power grid for Ukraine’s capital, Kiev, was hacked. This virus can disrupt critical infrastructure systems that control power, causing a community to lose power. The hack can happen on any scale; it can affect large cities and even small towns. But why is this important and why should you care?

It Takes Advantage of Old Systems
Because these systems are so dated, and because their communication protocols are not designed with security in mind, the hackers do not need to look for protocol vulnerabilities to hack into them. Essentially, these are outdated systems that make it extremely easy for hackers to spread the virus. The only thing hackers need to do is to teach the Industroyer virus to speak those protocols so it can get into their system.

Read More: How to Prevent Identity Theft When You’re Online

The worst part of this virus is that it makes it nearly impossible to reboot the computer that it has infected, which only prolongs the amount of time a city’s power is hijacked. These hackers could ask for anything in return and can essentially hold the city — and it’s people — hostage.

This Virus is Hard to Detect
Another issue that makes this virus extremely dangerous is that it’s difficult to detect. It’s very crucial that city officials can detect the Industroyer virus because it has the capability to control the power grid. This means that hackers may potentially have the power to cut power for the hospital when patients are mid-surgery or even cut the traffic lights, which would cause traffic accidents.

It Could Be Even More Damaging
One concerning aspect of this virus is that experts believe that it could be reformatted to affect other types of infrastructure such as water and gas. This would be very damaging, and it could lead to a mass drought or a loss of gas. Another type of critical infrastructure it may be reformatted to control is transportation control systems, which could lead to mass chaos for transportation.

Can the Industroyer Virus Affect You?
Luckily, for those living in the U.S., the Department of Homeland Security says that it is investigating the virus and that it has checked and found no evidence of it in any U.S. critical infrastructure. Because the United States government is aware of the issue and is looking into the hackers involved, there is a low chance that the Industroyer virus will personally affect you or your town. But this is still a lesson for all global governments to be aware that infrastructures are vulnerable to attacks.

]]>
<![CDATA[The Most Common Viruses of 2017 and How to Stop Them]]> https://www.psafe.com/en/blog/most-common-viruses-of-2017-and-how-to-stop-them/ Mon, 04 Dec 2017 23:00:14 +0000 https://www.psafe.com/en/blog/?p=15557 With such a vast number of different viruses floating about, it can sometimes be tough to know if your laptop or smartphone already has a virus. Viruses can be dormant on a device for years, or else they can be hidden deep inside a device, avoiding detection in order to collect information. The only way to know for sure if your phone is safe is to regularly scan your device for viruses. Use the  full virus scan feature in our dfndr security app to check your Android and SD card for hidden viruses:


The full virus scan uses machine learning to update its virus database continuously and help fight new, emerging viruses, which means that your phone will always be protected against the latest threats, in real-time. Learn more about some of the most common viruses from this year.

Read More: 5 Phishing Clues to Look for in Emails from Your Contacts

  1. The Hummingbad Virus

This awful virus has infected over 10 million Android phones worldwide (so far) in 2017. This virus roots itself into your phone’s operating system, collects all of your personal information, and then commits click fraud on your behalf. Click fraud is when a virus makes your phone click on an advertisement repeatedly to generate revenue for the host site. This app is difficult to notice because it doesn’t slow down your phone or give you any reason to think that you may be infected with malware. The virus may be attached to an app on your phone, so be cautious of which apps you download from the Play store.

  1. The Trojan Virus

This virus is tricky because it attaches itself to a harmless looking app or program. However, once the app is installed on your phone, the Trojan virus is activated and begins to spread. This virus scans for sensitive information like account information, bank information, or credit card accounts. The Trojan virus can also hijack the browser, causing your smartphone to send expensive premium rate texts without your authority. This virus is also dangerous because it can deactivate some of the applications you have downloaded or even freeze your phone altogether. A good way to get rid of this virus is by running a Full Virus Scan on your device to remove the virus. In the future, be cautious of which apps you download.

  1. The FalseGuide Virus

This may be the worst virus of them all because once it’s on your phone it cannot be removed. As of now, the FalseGuide virus has infected over 2 million phones. The virus spreads through sketchy Android games in the Google Play store. These “gaming apps” have many different names and are listed under different fake developer names.

]]>
<![CDATA[This Mobile App Allows Cybercriminals to Create Ransomware]]> https://www.psafe.com/en/blog/mobile-app-allows-cybercriminals-to-create-ransomware/ Fri, 24 Nov 2017 00:00:55 +0000 https://www.psafe.com/en/blog/?p=15468 With hacks and malware becoming more and more common, it’s difficult to know how to truly prevent cybercriminals from stealing your private information. The best ways to keep your phone and private data protected include: being cautious of which apps you download, avoiding suspicious-looking links or ads, and regularly running virus scans on your device. Use the full virus scan feature to scan your phone and SD card for hidden malware, and ensure that your phone is secure:


The best part of this feature is that the database is continuously updated, so your phone will always be protected against the latest threats, in real-time.

An App to Create Ransomware
This malware app is essentially a smartphone application that can be used to make custom ransomware attacks that target Android devices. The app was originally meant to be run from a computer or laptop, but now the app has been reformatted to function on a phone. Many developers call apps like this a “Trojan” or “TDK.”

Read More: How to Protect Your Data from Ransomware Attacks

It’s interesting to note that these apps only can run on Android and can only target other Android phones. The app isn’t on the Google Play store though; the only way you can access this app is by going to China’s Great Firewall hacking forums.

How Do You Use the App?
This app is a subscription-based service, so at least hackers are paying to steal data from you. When you download the app, new users can make a one-time payment for the app. New users also get the experience of communicating with the criminal service provider. This can be a big deal for newer hackers who may want advice on how to use the app. According to malware experts, there isn’t a limit on how many different virus strains a new subscriber can make once they’ve paid the subscription fee.

How to Keep Your Private Data Safe
If you have an Android, it’s really crucial that you keep your information safe from these virus strains. One way to keep safe is to avoid using public Wi-Fi networks. These public networks are extremely easy for hackers to use. They can view your private data because they get between you and the network and watch everything you do.

]]>
<![CDATA[How Can dfndr Help You When Traveling Abroad?]]> https://www.psafe.com/en/blog/how-can-dfndr-help-you-when-traveling-abroad/ Tue, 24 Oct 2017 00:00:13 +0000 https://www.psafe.com/en/blog/?p=13093 During the summer months, more than nine million Americans will travel outside of the country. With these increased traveling numbers come a heightened number of phone thefts. Even popular vacation destinations such as Spain have reported theft incidents at rates as high as 1,074.9 per 100,000 individuals. Travelers also face dangers when relying on public Wi-Fi networks, which are common in airports, hotels, and other transportation hubs. Click here to quickly check your Wi-Fi’s security:

Test-Your-Connection

The danger of simply misplacing a phone or plugging a charger into an unsafe outlet is magnified in an unfamiliar city. Luckily for dfndr users, the service’s built-in anti-theft and advanced protection features can help prevent and remedy these worst-case scenarios. Find out how to take advantage of both features to protect your phone on your next trip abroad.

Read More: New AI Can Crack Android Pattern Locks from Afar

anti-theft
Thefts in popular tourist locations, such as (but not limited to) Mexico and Costa Rica, specifically target vulnerable foreigners. Some robberies will occur while a thief poses as a plainclothes cop and asks for credentials, which are then stolen along with valuables. Other times, nice cars harboring visible electronics will be targeted and the windows will be smashed.

However, if you activate anti-theft on your phone in advance, then you will be fully protected in the event of loss or theft. This feature allows you to remotely control your Android device and block thieves from accessing apps and media files or delete these files entirely.

anti-theft also allows users to remotely erase all data on the device, track the device’s location, and sound an alarm (to find the phone nearby). Thanks to these protective functions, thieves will not be able to locate sensitive data or access accounts within the phone. Click here to activate anti-theft now:

activate-anti-theft

advanced protection
Public Wi-Fi networks are notoriously unsafe options for mobile users. Unfortunately, the cost of international data plans forces travelers to become almost entirely dependent on such networks for Internet access. In particular, both Russia and China pose significant risks to mobile security thanks to the number of cybersecurity threats. Further, while travel ports and charging stations within airports are tempting for travelers running low on juice, these outlets are often targeted by hackers, as well.

That’s why it’s important to add additional protection on your phone, especially when traveling abroad. The advanced protection feature will prevent thieves and viruses from disabling dfndr’s security, and ensure that your phone stays protected no matter what. Click here to enable advanced protection on your phone:

Educação digital

]]>