The tricks most used by the cybercriminals to enter a phone

cel.jpg

The techniques they use to increase the effectiveness of their attacks are in two categories: on the one hand, Social engineering strategies (consist of psychological manipulation and persuasion so that the victim voluntarily provides personal information or performs Some act that puts their own system at risk) and, on the other, technical mechanisms to hinder the detection and analysis of malware. Eset Latin America summarizes the most frequent behaviors in relation to malicious codes for Android in recent years, based on Social engineering:

  1. Use of fraudulent accounts in the Play Store for malware distribution.

  2. Commemorative dates and launching of expected applications.

  3. Tapjacking and overlay of Windows.

  4. Camouflage among the applications of the system.

  5. Simulate being system apps and security to request Administrator permissions

Image Source

H2
H3
H4
3 columns
2 columns
1 column
Join the conversation now
Logo
Center