Malicious ads trigger drive-by download of persistent Android adware

UK and US Android users have been saddled with unwanted apps via malicious ads that executed a drive-by download attack. According to Zscaler researchers, the malicious ads were posted on forums, including one named GodLikeProductions, a relatively popular site that serves a community of conspiracy theorists. If loaded by Android users, the ads would trigger the automatic download of an app named Ks Clean (kskas.apk), which poses as a cleaner app. Victims still had to … More

from Help Net Security http://ift.tt/2r4Llds

Anuncios

Responder

Introduce tus datos o haz clic en un icono para iniciar sesión:

Logo de WordPress.com

Estás comentando usando tu cuenta de WordPress.com. Cerrar sesión / Cambiar )

Imagen de Twitter

Estás comentando usando tu cuenta de Twitter. Cerrar sesión / Cambiar )

Foto de Facebook

Estás comentando usando tu cuenta de Facebook. Cerrar sesión / Cambiar )

Google+ photo

Estás comentando usando tu cuenta de Google+. Cerrar sesión / Cambiar )

Conectando a %s