La pagina può visualizzarsi in modo non corretto.
L’analisi delle tecnologie utilizzate dai malfattori ci permette di trarre conclusioni su possibili vettori dello sviluppo del settore dei virus affinché possiamo affrontare le minacce future in modo ancora più efficace. Scoprite anche voi come funzionano in sistemi infetti determinati programmi malevoli e come affrontarli.
Program.FakeMoney virus records are used to detect fraudulent applications that are positioned as online money-generating instruments. Users of such software do not actually receive the payments promised to them and risk having their personal data exposed by filling in special money withdrawal forms.
Most often potential victims are offered the opportunity to perform various tasks. This includes watching video clips and advertisements, writing reviews on certain sites and for certain services, and installing games and apps, to name a few. After successfully completing tasks, users receive a reward, which typically comes in the form of virtual currency. In theory, this reward can be converted into real money or exchanged for valuable consumer goods. In practice, however, when dealing with such apps, users risk encountering numerous problems.
First, these apps may initially set a high minimum number of rewards that must be collected in order to initiate the withdrawal process. With that, the reward for completing tasks is, on the contrary, set low to impede the user from collecting the necessary amount too soon. This effectively will delay the “payments” for as long as possible. As a result, users will waste significantly more resources—like time, internet traffic, and electricity—on completing tasks in comparison with the income they expect.
Second, the money withdrawal process itself can be artificially made complicated or absent altogether. For instance, users may be told that their request is in a queue, that the payment system or bank involved requires more time to process the request, or that there was an unexpected error.
Third, the tasks offered can pose a potential threat. For example, malicious actors can disguise trojan applications as harmless games that must be installed for a reward. And the ads displayed may propose illegal items and goods or fraudulent websites.
Secondo le statistiche ogni quinto programma per SO Android contiene una vulnerabilità (ovvero un "buco"), il che permette ai malfattori di introdurre con successo trojan mobili sui dispositivi e di eseguire le azioni richieste.
Auditor di sicurezza in Dr.Web per Android farà la diagnostica e l’analisi della sicurezza del dispositivo mobile, proporrà soluzioni per risolvere i problemi e le vulnerabilità rilevate.