Fake Android Apps Infect User Devices with SpyNote RATs

Oh no, it looks like Android has some RAT problems. Remote Access Trojan (RAT) programs are a class of malware that provides remote hackers backdoor access and administrative control over a victim's device. In other words, if you accidentally download a RAT, some faraway cybercriminal can use your smartphone for nearly any purpose. Scary stuff, right?

This is especially frightening since more and more people use their mobile devices for personal and professional purposes. Your business might already be breached by a RAT without you even knowing it. Thankfully, CyberPolicy offers cyber policy insurance to protect businesses from the costly effects of data breach.

Of course, no one hopes it gets as far as that, so check out these tips for protecting yourself against Android RATs.

Rat Race to the Bottom
Admitted, the recent RAT infestation isn't the first time security concerns have been raised about Android; but this recent scam is especially daunting since fake and infected apps are popping up on several third-party app stores. To ensnare victims, hackers have developed phony versions of popular apps including Netflix, WhatsApp, YouTube, Instagram, Facebook, Photoshop, SkyTV, PokemonGo and more!

Each of these apps are infected with SpyNote, a RAT malware program that allows hackers to eavesdrop on your calls, record audio through your phone's built-in microphone, control your camera, make calls on your behalf, steal your messages, pilfer your contacts and so much more. How do you feel knowing a cybercriminal could be spying on your business communications right now or listening in on you at home?

One of the reasons mobile devices are so risky for businesses is that they can be taken out of the office, used on insecure public Wi-Fi and are regularly used for personal reasons. Not to mention that humans are the weakest link in the cybersecurity chain, making incursion dreadfully easy for cyber crooks.

Below are a few suggestions to sure up your mobile device against hackers and RATs.

  • Download your apps from the Google Play Store: Third-party app downloads are far more vulnerable to imposter applications and harmful software. Of course, that doesn't mean all apps in the store are totally safe.
  • Avoid links and messages from unknown contacts. Trojan downloads aren't the only way RATs can infiltrate your phone. Crafty hackers will often send malware through email and SMS links.
  • Delete the infected app and eradicate its files. Removing a RAT from your mobile device or your computer isn't as simple as deleting the app. Command & Control scams developed by cyber crooks will upload shady files to your device that are difficult to find. Ask an IT professional for help tracking down subsequent malware.
  • Beware excessive permissions. Most apps require some permissions, but does your video streaming app really need access to your contacts? Does your calculator app really need access to your microphone? Stay suspicious and stay smart.
  • Look at the app's reputation, but don't put too much trust in reviews. Who developed the app? Are they a legitimate business, a new developer or something a little fishier? Remember that it is very easy for a hacker to drum up hundreds of fake reviews.

While following these steps will decrease the likelihood of incursion, there is no foolproof method to block cybercrime. Insulate yourself against the ruinous effects of data breach with a cyber policy insurance plan from CyberPolicy.

Curious to see what cyber policy insurance can do for you? Visit CyberPolicy today!

© 2016-2020 CyberPolicy, Inc. All rights reserved. CyberPolicy®, "Plan. Prevent. Insure."™, and "CyberCheckup"™ are trademarks of CyberPolicy, Inc.
DBA: CyberPolicy Insurance Solutions CA License No. 0L13180
DBA: CoverHound Insurance Solutions CA License No. 0H52375