Always Use Protection

By Michael Soto ·

The pace at which security exploits are being discovered on mobile operating systems is skyrocketing. They’re also having a major impact on device security, performance, and in some circumstances, can render your device useless and irreparably damaged. I’ll say it again. Your device can be rendered useless and irreparably damaged.  

What am I talking about?

It has a name and it’s “SHIFTY BUG”! This one is wicked and is targeted at Android devices. Within the last week, more than 20k apps have been discovered to have trojanized adware appearing as completely legitimate applications. You’re probably very familiar with some of these applications such as:

  • Candy Crush
  • Facebook
  • GoogleNow
  • NYTimesOkta
  • Snapchat

The list is just the tip of the iceberg.

What does it do?

The threats inject malicious code into popular applications that are found on the most frequented app stores. Third-party app stores are then leveraged to host the maliciously masqueraded applications and appear to be fully functional. However, the applications have the addition of a payload that is capable of rooting the device. 

If you stick with “standard” app stores such as Google Play or Amazon, the apps are fine; it is only when they are downloaded from less reputable, third-party stores that they may contain the malware.  

I can stop this, right?

Not so fast. Earlier iterations of the adware were relatively simplistic in nature and considered to be more of a nuisance. You may notice adware popups inside your applications; but oftentimes this latest breed will run silently in the background and compromise your device without your knowledge. If your device has been infected, you will very likely be unable to remove it without the assistance of a professional or be faced with the decision of purchasing a new device.

As with many other exploits, this too has genealogy to known threats. If you’re familiar with Memexploit, Framaroot or ExynosAbuse, then you’re probably aware of the control an application can gain through the exploits.

Ok, I get it. I should always have protection, right?

RIGHT!  If you’re like most people, then you’re carrying around a lot of sensitive information on your device(s) that you don’t want getting out in to the wild.  Also, if you want to avoid the hundreds of dollars in cost of having to purchase a new device then protect your device(s) with mobile security software that is capable of detecting and protecting you from known and unknown threats.

Here’s another perspective that may help:

Co$t_of_prevention < co$t_of_remediation

</perspective>