Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Dresscode Malware could Prove Perilous for Companies

According to security researchers from Trend Micro, of late, Google's Play Store contained over 400 applications which made tainted mobile phones hear posts capable of draining off sensitive data from protected networks with which they were linked.

The mobile phones tainted contracted a malicious program called Dresscode, which made its debut in April. If any unwary mobile owner downloads it then the controllers of the malware would be able to pull down sensitive data, execute cyber-espionage, and add devices to a botnet.

Furthermore according to Trend Micro, one of the 400 applications mentioned had been loaded onto devices at least 100,000 times to a maximum 500,000. After getting loaded, Dresscode acts to communicate with its C&C servers to take commands of its controllers. Computerworld.com posted this, September 30, 2016.

Researchers have detected Dresscode to be a Trojan so when the application tainted with it is loaded onto a mobile phone which is linked with a company's network, the problem starts. Dresscode contacts the hacker via its command-and-control system as also lets him gain admission into the company network through the phone. Thereafter, crucial database gets downloaded from the network alternatively DDoS assaults launched via creating a network-of-bots inside the company network.

Trend Micro explains that Dresscode is especially perilous as it infiltrates any Internet-connected network with which the contaminated phone has a connection. To illustrate, suppose an employee of an office brings a mobile and plugs it into his workplace network then Dresscode's creators may utilize the phone like one tunnel for hacking into the network followed with downloading sensitive folders.

It has been found that for every malicious app merely a tiny portion had the malevolent activities, something which makes detection hard. During 2012, Google launched one security scanner named Bouncer which was cloud-based as it scanned Play to find malevolent applications. From that time on, researchers have spotted numerous malicious applications.

The security company Trend Micro suggests Android smart-phone owners to be precautious such as applying updates, handling applications they install cautiously, relying on public WiFi as little as possible, and never counteracting their mobile phones' security lock-downs.

» SPAMfighter News - 10/7/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page