‘Daam’ Virus Steals Call Records, Reads History from Android Phones; Central Agency Issues Advisory

0
23
‘Daam’ Virus Steals Call Records, Reads History from Android Phones; Central Agency Issues Advisory


‘Daam’ is able to hacking cellphone name recordings, contacts, getting access to digital camera, modifying gadget passwords, capturing screenshots, stealing SMSes, downloading/importing recordsdata, and so forth. (Representational picture: News18/File)

Authorities mentioned the virus can be able to “bypassing anti-virus programs and deploying ransomware on the targeted devices”

An Android malware referred to as ‘Daam’ that infects cellphones and hacks into delicate knowledge like name information, contacts, historical past and digital camera has been discovered to be spreading, the nationwide cyber safety company has mentioned in its newest advisory. The virus can be able to “bypassing anti-virus packages and deploying ransomware on the focused gadgets”, the Indian Computer Emergency Response Team or CERT-In said.

The agency is the federal technology arm to combat cyber attacks and guard the cyber space against phishing and hacking assaults and similar online attacks. The Android botnet gets distributed through third-party websites or applications downloaded from untrusted/unknown sources, the agency said.

“Once it is placed in the device, the malware tries to bypass the security check of the device and after a successful attempt, it attempts to steal sensitive data, and permissions such as reading history and bookmarks, killing background processing, and reading call logs etc,” the advisory mentioned.

‘Daam’ can be able to hacking cellphone name recordings, contacts, getting access to digital camera, modifying gadget passwords, capturing screenshots, stealing SMSes, downloading/importing recordsdata, and so forth and transmitting to the C2 (command-and-control) server from the sufferer’s (affected individuals) gadget, the advisory mentioned.

The malware, it mentioned, utilises the AES (superior encryption normal) encryption algorithm to code recordsdata in the sufferer’s gadget. Other recordsdata are then deleted from the native storage, leaving solely the encrypted recordsdata with “.enc” extension and a ransom note that says “readme_now.txt”, the advisory mentioned.

The central company instructed a lot of do’s and don’ts to keep away from getting attacked by such viruses and malware. The Cert-In suggested towards shopping “un-trusted web sites” or clicking on “un-trusted links”. Caution needs to be exercised whereas clicking on any hyperlink offered in unsolicited emails and SMSes, it mentioned. Install and preserve up to date anti-virus and anti-spyware software program, it instructed.

It additionally instructed that customers needs to be looking out for “suspicious numbers” that don’t look like “real mobile phone numbers” as scammers usually masks their identification through the use of email-to-text companies to keep away from revealing their precise cellphone quantity.

“Genuine SMS messages acquired from banks often include sender ID (consisting of financial institution’s brief title) as a substitute of a cellphone quantity in the sender data subject,” it said.

It also asked users to exercise caution towards shortened URLs (uniform resource locators), such as those involving ‘bitly’ and ‘tinyurl’ hyperlinks like: “http://bit.ly/” “nbit.ly” and “tinyurl.com/”. Users are suggested to hover their cursors over the shortened URLs to see the complete web site area which they’re visiting or use a URL checker that can enable the consumer to enter a brief URL and examine the complete URL, the advisory instructed.

(This story has not been edited by News18 employees and is printed from a syndicated information company feed – PTI)



Source hyperlink