The new malware named ‘Judy’ has infected more than 36.5 million android mobiles. It has been found in more than 40 apps from Google Play Store. To avoid being victim check out below on How to Protect from Judy Malware.
The security firm CheckPoint has found the new malware from Google Play Store and alreted to developers of Google. The company working seriously on removing new malware which spread in Play store.
What is Judy Malware and how does it work?
According to the security firm, Judy is an auto-clicking adware, which creates false clicks on advertisements, and generates substantial revenue for the attackers.
The working of Judy Malware is quite interesting. Google Play usually runs a protection tool known as Bouncer to avoid malware which upload and approval in store. The hacker has created harmless app by passed security.
The malware mainly because not based on an app, but with a Control and Command server. Once the user downloads the malicious apps, the malware manages to connect to the server, which delivers the malicious payload.
Who is behind Judy?
CheckPoint says the group behind this attack is known Kiniwini, which registered on Google Play as ENISTUDIO corp. The group belongs from South Korean, and the company develops freemium apps on both Android and iOS.
How many users are infected?
According to the security firm, “the malicious apps reached an astonishing spread between 4.5 million and 18.5 million downloads.” The total spread of the malware may have reached between 8.5 and 36.5 million users.
How to protect yourself from this malware?
To avoid Judy Malware, First you need to be aware of installing apps from Play store, Check out Review and Rating section of the app to know details for any suspicious behaviour of the applications.
Next, update your device with lastest Software and security patch.
Install Anti-Software solution for your android device to avoid malware.
Google says that it scans more than 50 billion apps every day, and the new feature will detect and remove apps that might be harmful.