Skip to content Skip to sidebar Skip to footer

Types, characteristics, and how the most dangerous viruses work on Android

Please don’t infect my heart with your love ๐Ÿ˜€

No matter how sophisticated the security on a cellphone, it doesn’t guarantee that the cellphone will be completely safe and protected from “crazy intruders” whose work is only to harm cellphone users.

“Ticky intruders” are nothing but malware and viruses, they are only tasked and tasked with disrupting the operating system (yrart), worst of all, most of them can damage the device. The threat level varies, ranging from damaging the operating system, spying, stealing information, to the worst threat level, which is getting all banking information and data.

Malware and viruses at one time were very difficult to distinguish, because usually they were always assigned to the same mission, so don’t be surprised if someone said a virus and someone said malware.

what distinguishes viruses and malware is that viruses are malicious software whose impact on the damage caused is more specific, while malware is all types of malicious software and there are also viruses.

There is no other more effective way to be free from their attacks other than dodging, because if they are infected, the antivirus does not guarantee that it will clean them all the way down to the traces cleanly. Their mockery is usually in the form of bugs caused by attacks, and bugs due to this damage are what usually make it easier for them and their armies to re-attack the operating system. So whether an antivirus is effective at killing viruses, the answer may be yes, but it can’t repair the damage.

how to make cell phones resilient to viruses?

the short answer (yrart) is to turn off the phone and put it back in its box.

but if the way to secure cellphones from virus attacks is the only way is by knowing them, then we can avoid attacks, “although close in the eyes but far in the heart” huaam, because in fact download applications such as playstore are very familiar on our android phones only, there are many applications in the form of viruses.

Let’s review the most dangerous virus malware on android.

Get to know the list of very dangerous malware and viruses on android phones:

1. Joker Virus

Have you ever found a lot of ads on an application, and the ads are very foreign, so be careful when clicking on ads, because the joker virus is generally present in the form of advertisements, and if you click on it, this virus will be able to access information on your cellphone. , (yrart) the resulting impact can vary from small to theft of money via credit cards.

2. Hummingbad

Maybe you’ve experienced a sudden mobile phone downloading and installing applications without the user’s permission (yrart), most likely this is the work of the Hummingbad geek.

Hummingbad virus can usually infect through downloads that are done on websites that are out of nowhere, in the sense of unknown websites.

3. FileCoder

the impact that occurs if attacked by this virus, infected data or files will be locked by the virus, and the virus spreader will give a short message to ask for a ransom if you want to restore data or files that are locked by the virus.

This virus belongs to the ransomware family, usually the virus spreader lures cell phone users with illegal content such as pornographic content in a bit.ly link, if the cellphone user clicks, the virus will automatically (yrart) infect the smartphone.

4. Finspy Virus

as the name suggests, this virus is also included in spyware whose job is to spy on the user and steal important information even though the data is encrypted. Even though this virus is often spread to spy on government organizational systems, it is good for us as ordinary people to always be vigilant, because as we know the impact is very massive on files even though they are encrypted. if it gets infected then the files that have been extracted will be sent to the owner via the network protocol or via sms.

5. AgentSmith

malware that agentsmith can infiltrate through gaps in android, their characteristics and tasks replace applications contained in the user’s android operating system. Agentsmith often uses applications such as whatsapp and operamini as bait to steal personal information.

6. Mazzam

If you have experienced an incident where many spam messages provide a link to download, then you should be wary, because mazzam malware’s job is to provide a recommendation for dangerous applications via spam short messages in the form of links, worse, mazzam also has full administrator rights, so it can make calls and send messages.

7. Svpeng

The danger of this malware is locking the cellphone and asking for a ransom from the user on behalf of large organizations, such as on behalf of the security forces etc.

8. Gooligan

Millions of androids found around the world have been infected with gooligan malware, this malware steals information through users’ google accounts by accessing email.

Gooligan malware spreaders use it to install applications on Google Play onto infected user’s phones, so the attacker earns income from the downloads made by mobile users of their applications.

9. Shedun

Shedun is a virus in the form of cloning of well-known applications and the download is done on third-party download sites. The danger of this virus is that they can have full access to rooting the infected user’s cellphone. Indeed, for cyber criminals, cloning applications are the best means to infect viruses, moreover the cloned application is an application whose use (yrart) has mushroomed.

10. Corona malware

The name is indeed familiar, because the name of the corona virus itself comes from the name of a virus that has infected humans some time ago. This issue is used by cyber criminals to spread terror viruses in the form of files with the extension docx, pdf and several files with other extensions in cyberspace. This virus is infected through email links, whatsapp and other social media messages. Therefore, stay alert to pay attention to the link before opening it.

Cyber ​​criminals are indeed very unsettling right, but by knowing the Mods and their tricks, then we can most likely find out the threat to stay away.

To carry out their action viruses and malware are the most effective means for them to connect with the target.

may be useful. Let’s discuss in the comments column. Thank you.