Malware Alert: Tekya ransomware attacks consumers amidst the epidemic of covid19

by Raul Tizen
0 comment

Experts have uncovered a new class of auto-clicker malware that is committing smart phone ad fraud, hiding on Google Play store in 56 applications. It has been collectively downloaded over a million times worldwide. The Google Play Safe feature in the Google Play app store aimed at shielding Android devices from possible malware was found not capable of providing airtight protection in at least one situation, research has suggested. The cyber security force further reported a new family of malware was running in 56 Android apps and was unknowingly downloaded more than a million times worldwide.

 The malware called’ Tekya’ has also recently been detected in 24 applications for kids and many other convenience devices, such as cooking applications, calculators, etc. Check Point researchers found that hackers cloned some common apps using Tekya malware, renamed them and brought them back into the market with the included mobile adware, to commit ad frauds. Some of the devices that are compromised like Cooking Great, Let Me Go, Space Race. Tekya raises revenue for cyber criminals by committing smartphone ad fraud by claiming to be a customer clicking on legitimate online advertisement agencies and banners;

Check Point analysts found eight applications— mainly camera tools and children’s games again— distributing a new ransomware strain called Haken that exploits data and signs users up for costly subscription services. Now with Tekya’s revelation— which had eluded typical anti-malware detections during Check Point’s testing— it seems like the tech giant definitely has to be much more cautious throughout this regard.

Important Update : Check Out How Severely Coronavirus Affected Smartphone Companies

It registers as “us.pyumo.TekyaReceiver” until an infected device is installed, and can execute several activities, researchers described in their article. These activities include:’ BOOT COMPLETED’ to allow code to run after starting the device;’ USER PRESENT’ to determine when the user is actively using the device; and’ QUICKBOOT POWERON’ to enable code to run after restarting the system, researchers have said.

Also after the review by Check Point, Virus Total and Google Play Protect security safeguards could not pick up the Tekya ransom ware, researchers admitted, stressing yet more that “the Google Play Store still host harmful applications” amid enhanced defenses.

Over 3 million applications are available from the marketplace, with hundreds of new applications added each — making it impossible to verify if any single app is free, “researchers wrote. “And consumers cannot rely entirely on security controls from Google Play to ensure their devices are secure.”

Google also recently released additionally brand-new ways that its Sophisticated Security Software defends individuals against ransom ware on Smartphone devices. Google’s brand-new intros consisted of banning application installs from outside the Play Store and even turning device testing directly on Play Safe. Hackers are also seeking ways to hack the app store to commit ad fraud, according to Check Point’s analysis released on Tuesday.

Trending now : The Best Chromebooks? Find Out The Best Ones here

Steps to protect from such malware

For children now restricted to their homes in the UK amid theCovid-19 coronavirus outbreak, leading to greater usage of apps throughout the board, parents will take extra measures to track and protect the gadgets that their children are using. When you think that you might have one of these compromised applications on your computer, here is what you can do:

  • Delete the compromised software program
  • Download a protection solution to avoid possible infections

 Upgrade your system’s Operating System and Applications to the current update and enjoy safely.

You may also like

Leave a Comment