Types of Android Malware which infect your smart phone

Hello All,



Today, Android operating system has a popularity in market as compared to other mobile operating system. Android market has a boom in last few years leaving apple’s IOS behind. As per strategy Analytics research, Global smartphone OS Shipments and Market Share in Q3 of 2016 for Android was 328.6 which was high by 10.3% from last Q3 of 2015. Following table is the witness of this research.




As the above table shows the growth of android market,which made cyber criminals to caught attention.Recently Malware attacks by attacker increased drastically. They can easily enter into the android mobile system and can steal the personal records from android owner. At present the malware are getting advanced due to technology development. It is recommended always to stick to the official google play store applications to protect your device from malware.

Following are some types of malware used for attacking your device.


1. Ransomware Malware

It is a computer malware which attacks victim’s device (computer, smartphone, wearable device etc.), encrypt the data from the device and show the message by demanding the money to unlock/decript the device. For this reason it is recommended to regularly backup the device data to the cloud. Ransomware can infect your device if you are using third party application,it can also be spread through other means such as infected emails and unsecure website. It can even hijack your phone’s PIN and
can use the device without owner’s permission. 


2. Mobile Shut down




Power Off hijack which was discovered by AVG is a malware which controls the process of shutting down of mobile phone. When your mobile phone is infected with this malware, your phone will show shutting down screen but actually this malware secretly takes pictures, make calls and send messages. This malware usually attacks the phone which are having android version under 5.0.
3. Hummingbad malware




Recently, this malware has affected 10 millions smartphones across the world. This malware attacks your device by forcefully entering your device through website by clicking on advertisement or forcefully will tell you to install third party application. If it succeeded, it will try to access your root of your device to gain full access of your device to the attacker.

4. Viking Horde



This malware might prove dangerous to your device because it uses Google play store applications to get root access of your mobile device. It can gain root of access of both rooted devices as well as of non-rooted devices. After successful entry of this malware into your device, the attacker can remotely access your device and your data might be at risk.

5. Phishing Apps




Mobile browsing is increasing drastically. Taking advantage of this, hackers create similar website as like legitimate website. It will prompt the message on webpage for installing application which by mistakly it will be installed on your smartphone and infect our smartphone.
How to get secured from malware?

If you want to secure your mobile device from malware there are some best practices which we should follow. Following tips will secure your mobile device from malware attack.

1. Application from trusted sources
Always download application from the trusted sources like google play store.You should only give permission to that application which will be downloaded from trusted sources.Companies should make their own application store to distribute custom app.

2. Refer description of application
Do some research about developer, rating on application etc. Also research on ratings and reputation of developer.

3. Turn off Unknown source option

If you are using android device you should first disable unknown source application option. You will find unknown application option in setting.

To allow app installs from Applivery, follow this steps:

1. Go to Settings -> Security
2. Check the option Unknown sources
3. Tap OK on the prompt message



About the Author: chinmay

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.