Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Dangerous Android App Masquerading as System Update

Dangerous Android App Masquerading as System Update

Let’s face it, most people are glued to their phones when they have downtime. Many don’t look up to cross the street. With this much dedication to their individual mobile devices you’d think that people would be more careful about what they download.

Apparently, that Instagram feed is just too distracting to worry about individual data security. 

 Researchers from the mobile security firm Zimperium have discovered a malicious app that pretends to update your Android device, but is just spyware that can steal almost all of your data and monitor your search history and your location. Simply called “System Update” it has tricked many unsuspecting Android users as of this writing.

What Can “System Update” Do?

The spyware, or officially Remote Access Trojan (RAT), attached to this malicious download can only be downloaded outside of the Google Play store, which is fortuitous for many would-be victims of a malware attack like this. The spyware can effectively steal messages, contacts, device information, browser bookmarks, user search history, and can gain access to the microphone and the camera.

What’s more, it continuously tracks a user’s location, which can be really dangerous for anyone. The app starts spying everytime the device receives new information, which for any heavy user is constant. After stealing your data, the app will work to erase the evidence of it’s activity, effectively covering its tracks indefinitely.

 All-in-all, it is a pretty tough cookie. 

How Are People Accessing This Malware?

You won’t be surprised to learn that phishing is the number one way people are being exposed to the corrupt “System Update” app. Google continuously warns people to not install apps from outside the Google Play app store, but as people’s devices age, they aren’t always compatible with older operating systems found on these devices and start looking for options outside of the Google Play app store. This can lead to people downloading apps that seem useful, but are completely nefarious. “System Update” seems to be one of those apps.

What You Can Do to Protect Yourself

While there have been nefarious apps found on the Google Play store in the past, the malicious app rate is extraordinarily low when sticking to the official app store. Users should also consider questioning any situation where an app is suggested for you outside of the app store, even if it seems to redirect you to the Google Play apps store. You just never know what you are going to get when you trust third parties on the Internet.

 If you need a comprehensive plan to protect your business data from employee impulse and mobile negligence, give our technicians a call today at (415) 295-4898. We can help you with mobile device management (MDM) and Bring Your Own Device (BYOD) which can have all types of benefits for your business.

How’s Your Password Hygiene?
Tip of the Week: How to Keep Your Team from Burnin...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, May 07 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing IT Support Data Data Backup Network Security Privacy Cloud Hosted Solutions Internet IT Services Data Recovery Software Business Efficiency Email Managed IT Services Google User Tips Mobile Device Small Business Innovation Hackers Malware Phishing Hardware Collaboration Cybersecurity Outsourced IT Communication Workplace Tips Business Management Android Cloud Computing Computer Upgrade Smartphone Managed Service Backup Quick Tips Tech Term VoIp Mobile Devices Microsoft Business Continuity Disaster Recovery Windows 10 Smartphones Covid-19 Ransomware Communications Paperless Office Users Saving Money Remote Work Managed Service Provider Passwords Encryption Network Browser Office 365 Remote Monitoring Business Technology Server Data Management BDR Wi-Fi Internet of Things Artificial Intelligence Help Desk Managed IT Social Media Windows Compliance Vulnerability Windows 7 Save Money Holiday Microsoft Office Healthcare Document Management Government Automation Managed Services Scam Applications Blockchain Virtualization Employer-Employee Relationship Facebook Health Chrome Remote Miscellaneous Data Security Laptops Managed IT services BYOD Vendor Management Two-factor Authentication Gadgets Office Redundancy Avoiding Downtime Infrastructure Antivirus Mobile Office Wireless Processor Machine Learning Information Analytics Bandwidth Meetings Project Management Tip of the week Information Technology Remote Worker WiFi Data Loss OneDrive IoT Regulations Training Maintenance IT Management Hard Drive VPN Customer Relationship Management Employee-Employer Relationship Networking Software as a Service Net Neutrality Router Storage HIPAA Apps Files Access Control Virtual Private Network Time Management RMM Website Proactive Company Culture Mobility Free Resource Unified Communications Financial Server Management Remote Monitoring and Management Operating System Professional Services Alert Data Storage Gmail Images 101 Management The Internet of Things File Sharing Cooperation Social Network Assessment Electronic Health Records Risk Management Employees Consulting Downtime Vendor Money Instant Messaging Spam Network Management Search Consultation Big Data Managed Services Provider Password Utility Computing Smart Devices Customer Service Bring Your Own Device Tablet Remote Workers Dark Web Augmented Reality Holidays Internet Exlporer Smart Technology Co-Managed IT Remote Computing Computing File Management Conferencing Mobile Word Recycling Unified Threat Management Payment Cards Patch Management Data Breach Voice over Internet Protocol Monitoring Flexibility Display Mobile Security OneNote Permission Teamwork Cookies Cables Distributed Denial of Service Virtual Machines Recovery Migration Cybercrime eWaste Cyber security Legislation Address Remote Working Bluetooth Return on Investment Vulnerabilities Specifications Reviews Features Options Telephone Biometric Authorization Operations Techology IT Assessment Media Politics Managing Stress Digital Payment Hotspot How To Test Shared resources Nanotechnology Going Green Wires Managed IT Service Credit Cards Private Cloud Chatbots Database Management Budget Settings Mobile Computing Personal Information Black Friday End of Support Procurement Mirgation 5G Mobile VoIP Technology Laws Gamification Websites WPA3 CRM Wearable Technology Manufacturing Star Wars Outlook Disaster Resistance Digitize Ergonomics Virtual Assistant Bitcoin Enterprise Content Management Mouse Language Emergency Multi-Factor Security App Batteries Break Fix Computers Customer Relationships Bookmarks ROI Identity Theft GDPR Enterprise Resource Planning Printer Transportation Active Directory Geography Cyber Monday Staff Windows Server 2008 Gifts Cyberattacks Social Wireless Internet Cache Permissions Unified Threat Management SaaS Fleet Tracking Zero-Day Threat Content Filtering Mobile Device Management Microsoft Excel Shortcut Proactive IT Shadow IT Vendors Wasting Time Social Networking Current Events Computing Infrastructure CIO applications Screen Reader Innovations Favorites Identity Touchscreen Hacking Modem Windows Server High-Speed Internet Lenovo Hacker Read Only Security Cameras Employer/Employee Relationships Apple Google Calendar Fraud Outsource IT Asset Tracking Backup and Disaster Recovery Alerts Samsung Point of Sale Tech Terms Tech Support Hard Disk Drives Sensors IT Consulting Outsourcing Heating/Cooling MSP Finance Database G Suite Smart Tech Virtual Reality IT YouTube Notes Travel SharePoint Peripheral Trending User Management Development Firewall Superfish Optimization CES Printing Proactive Maintenance Solid State Drive Mail Merge User Error Laptop Statistics Human Error Comparison Licensing Banking E-Commerce Theft IT Technicians Solid State Drives Cost Management Video Conferencing Servers Authentication Motherboard Projects Chromebook Electronic Medical Records Connectivity Value of Managed Services Data Warehousing Business Telephone Videos PowerPoint Technology Tips Downloads PCI DSS Twitter Marketing Regulation Education CEO Students Printers Daniel Stevens

Latest Blog

Windows has no shortage of capabilities to offer its users, with many of these tools coming with an associated Windows shortcut. Since keeping track of all of them can be a challenge, we wanted to assemble a list of most of them for you. This blog will serve as that list, so...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...