Monday, March 30, 2020

Kaspersky CamScanner Found Malware Be Alert

Tech Kaspersky CamScanner Found Malware Be Alert

Kaspersky CamScanner Alert: 

Kaspersky CamScanner, Kaspersky security experts have detected malware in the free version of the popular CamScanner PDF creator program.
CamScanner is a very famous PDF creator application for phones with more than 100 million downloads in the Google Play Store. Kaspersky experts have discovered malware in the free Android version of the CamScanner application that attackers can use to remotely hack Android devices and steal target data.

Google has already removed the CamScanner application from the official Play Store and users must immediately remove the application from their Android device,

1. Kaspersky Analysis

“After analyzing the application, we saw an advertising library with a malicious pipette. Previously, a similar module was often found in malware that was pre-installed on smartphones made in China. It can be assumed that the reason why this malware was added was the association of the developers of the application with an unscrupulous advertiser, “according to Kaspersky’s analysis.

“Kaspersky solutions detect this harmful component as Trojan-Dropper.AndroidOS.Necro.

2. Kaspersky products detect this module as Trojan-Dropper

“Kaspersky products detect this module as Trojan-Dropper.AndroidOS.Necro.n, which we have observed in some programs that are pre-installed on Chinese smartphones. As the name suggests, the module is a Trojan dropper.

After Google removed the CamScanner application from the Play Store, the application developers removed the malicious code from the application with the latest update. Researchers warn that application versions for different devices vary, and some of them may still contain malware.

The version pays if the application does not contain a third-party advertising library, this means that it does not contain malware and for this reason, Google has not removed it from the Play Store.

Last week, ESET experts discovered that an Android application infected with AhMyth open source RAT has escaped Google Play security twice for two years.

3. Last Month Reports

In December, ESET security researcher Lukas Stefanko discovered the first Android cryptocurrency clipboard hijacker posing as MetaMask in the official Google Play Store.

“What we can learn from this story is that any application, even one from an official store, even one with a good reputation and even one with millions of positive reviews and a large group of loyal users, can change malware from one day to the next tomorrow. “Kaspersky researchers concluded.

4. Check Mobile-Phone Rates iPhone 11 Price Camera Features And Much More

Stay on up - Ge the daily news in your inbox

Recent Articles

Top Youtube to Mp3 Converter Sites

Top Youtube to Mp3 Converter Sites Here, I'll tell you which websites provide Youtube to Mp3 Converter online service. For using these websites, you can...

Pakistan defeat India Kabaddi World Cup 2020

Pakistan came out victorious from a close fight against India in the final of the Kabaddi World Cup on Sunday at the Punjab Stadium...

Healthy Eating with Gluten-free Diet: What is included and what is not

Food and gluten-free diet! What is it It may not be known to everyone. This type of diet removes gluten protein from your table....

RARBG Mirror Sites To Unblock RARBG 2020

RARBG Mirror Sites To Unblock RARBG 2020   No access to RARBG? Are you searching for some alternative ways to unlock RARBG? There are various methods...

10 Minute Mail Alternatives Top 10

10 Minute Mail Alternatives 10 Minute Mail Alternatives If you have noticed it by name, 10 Minute Mail is an e-mail service that offers users a...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here