GhostCtrl Backdoor Worm Can Silently Hijack Your Android Device

0
315

GhostCtrl Backdoor Worm: In recent days, malware, ransomware, malicious attacks are the biggest problems faced by the global companies. The malware is CopyCat, LeakerLocker and SpyDealer were making the rounds of the Internet, now a new malware attack GhostCtrl was revealed in the web which hijacks the Android device and silently watch all things that we used on our smartphone. Cyber-security analysts at Trend Micro have shown a backdoor worm that stealthily controls several functionalities of infected Android devices. I don’t provide any alarming, secretly recording audio or voice and send to the attacking server in an encrypted manner.

GhostCtrl Backdoor Worm

The GhostCrl Android malware has three versions; the first can collect the device information and control some of its functionalities. The second adds more features to favor an imminent device hijack, and the third combines the best of the earlier two and adds more features. Now, this worm can attack the Israel hospitals earlier and the ill-famed OmniRAT platform that was in news way back in 2015 for claiming massive exploits and remote-controlling Windows, Linux, and Mac systems via any Android device and vice versa.

GhostCrl Android malware:

The GhostCrl enter through the favorite apps Whatsapp and Pokemon Go. When we install the app, the malware also asked to install the malicious APK package. After the APK is installed, the worm will send all the data to the hacker without the user’s acknowledgment.

“The data GhostCtrl steals is extensive, compared to other Android info-stealers. Besides the information mentioned above types, GhostCtrl can also pilfer information like Android OS version, username, Wi-Fi, battery, Bluetooth, and audio states, UiMode, sensor, data from the camera, browser, and searches, service processes, activity information, and wallpaper,” reads the report. The GhostCtrl can also change the passwords and steals the data from the smartphones. It will gather information like Android OS version, username, Wi-Fi, battery, Bluetooth, and audio states, UiMode, sensor, data from a camera, browser, and searches, service processes, activity information, and wallpaper.

Trend Micro can provide the list of data safety measures. A few of them include updating the device to the latest firmware, backing up the data within certain intervals, and restricting user permissions for apps. Users can also switch to multilayered security mechanisms for better data management.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.