Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Bibliothèque de virus

L’analyse des technologies utilisées par les pirates nous permet de déterminer les axes potentiels d’évolution de l’industrie cybercriminelle et de résister aux futures menaces de manière plus efficace. Vous pouvez également en savoir plus sur le comportement des programmes malveillants dans les systèmes contaminés et sur les méthodes permettant de contrer les menaces.

Program.Algo360 in virus library:

Program.Algo360 is a special SDK designed to create users’ credit score based on their personal data. This software module is popular among Indian financial organizations which integrate it into their apps.

Depending on it’s version, module collects various information. Collected data is accumulated in JSON files, packed into ZIP archive and then uploaded onto developer’s server.

Among all known modifications of this SDK, the largest amount of data is collected by the module built into the Eduvanz application. Further example below will be based on this particular app.

  • SHA1: bc05ccaee5298f4e46fdccf73c1f1903fcb05432
  • Package name: com.eduvanzapplication
  • Version: 5.1.5

Upon first launch the app notifies user about collecting data and asks to agree with terms and conditions:

screenshot Program.Algo360 #drweb screenshot Program.Algo360 #drweb screenshot Program.Algo360 #drweb

Program.Algo360 module built into it collects the information as follows:

  • SMS, if one of the following conditions is met:
    • mobile phone number is based on 10 or less digits;
    • mobile phone number does not have +91 sequence in it. As a result, module will collect information about SMS received from any mobile numbers but the Indian mobile numbers;
  • names and types of all user accounts stored on the device;
  • the list of installed applications and Internet usage statistics for each of them;
  • the information about the device: device model name, manufacturer, IMEI, mobile operator name;
  • battery status: current time, charge level, whenever the USB cable is plugged in;
  • web browser bookmarks: title, url, creation date;
  • user calendar entries: events participants (their email, names, status), header, time, organizer, ID;
  • calls log: phone number, calling date, the lengh and the type of the call, entry ID in the calls log;
  • contacts from the phone book: name, phone number;
  • device geolocation information, and
  • SIM card data: slot which is currently in use, IMSI, IMEI, mobile operator name, mobile phone number, current time.

Les vulnérabilités de l’OS Android.

Selon les statistiques, un programme sur cinq créé pour Android comporte une vulnérabilité (ou autrement dit, un " trou "), ce qui permet aux pirates de contaminer les appareils.

Le Contrôleur de sécurité au sein de Dr.Web pour Android analyse le système afin de détecter les problèmes de sécurité et propose des solutions pour y remédier.