Blog

Malware That Targets Android Can Cause Major Problems

Malware That Targets Android Can Cause Major Problems

You often hear about malware that infects desktop PCs, laptops, or servers, but other types of malware that infect mobile devices also exist. One such malware, a threat called TangleBot, has been discovered, and it can become seriously problematic for both workers and consumers utilizing Android devices—especially in today’s mobile-centric workplace.

TangleBot is a malware that allows hackers to gain full control over the infected device, allowing them to steal personal information and other important credentials. Once the malware is installed on the infected device, attackers gain several permissions, including the ability to spy on communications with the device as well as use of applications like the camera, the device’s location, listening in through the microphone, and more. Suffice to say that this malware is capable of doing a lot of harm, especially since it has permissions to do so much. It can essentially monitor and record just about all user activity, from websites visited to credentials entered to recording video and listening to audio. 

This particular brand of malware spreads through text messages and infected links sent to the device. The user is encouraged to click on a link referencing the subject of the SMS message, usually something related to the COVID-19 pandemic and vaccination appointments or local power outages. After the user follows the link, they go through a series of messages allowing the attacker privileges that no applications on your phone should allow.

As you might suspect, many of the best practices that keep your users safe can also be used to secure your company from mobile malware. Using a bit of scrutiny when handling suspicious links can go a long way toward keeping your organization as secure as possible, but only if you encourage your staff to always be wary of what they are clicking on, both on the desktop and on the mobile device.

These practices are especially important in today’s workplace environment where many organizations have employees who are working remotely either part of the time or full-time, and especially important if the devices are company-owned and used to access sensitive workplace data. There are ways to secure devices that involve whitelisting and blacklisting various apps, including the ability to disable installing applications via links. In general, employees should be advised not to download applications that are not approved… particularly those that allow for insane amounts of permissions.

White Mountain IT Services can help train your employees to identify and avoid threats of all kinds. Furthermore, we can equip your company with the tools needed to prevent infections and keep threats to a minimum. To learn more, reach out to us at 603-889-0800.

By accepting you will be accessing a service provided by a third-party external to https://www.whitemtn.com/

Related Posts

If you use almost any Apple products, you’ll want to check for and apply an update that will prevent your devices from being spied on. Apple has just issued an emergency software update for a critical vulnerability that was recently discovered. The n...
While it only makes sense to assume that a cybercriminal would focus specifically on those targets that would bring them the greatest profit—in other words, larger businesses—the reality of modern cybercrime renders this assumption grossly outdated. ...
We’ve all been in situations where we just need our smartphone battery to last just a little bit longer, just until we can get home to plug it in. Unfortunately, due to the nature of smartphone batteries, they will ultimately degrade over time, no ma...
Ransomware is such a massive threat that all businesses should be aware of the latest news and findings regarding how it spreads and how it can be prevented. According to a recent report, the latest modes of transporting ransomware have been revealed...
We know that you might not feel comfortable traveling yet, and for good reason, but when you do, it is extremely important that you take steps to protect the technology you take with you on the road. Here are some of the best ways that you can keep y...
Think how much has changed in the past 20 years. The Internet went from dial-up to broadband. Cellular networks have brought computing to more people through the use of computers that fit in your pocket. These mobile devices have changed the way that...
A new ransomware attack has surfaced, this time mostly targeting IT companies and their clients. The attack is specifically targeting the Kaseya platform. Kaseya is management software that many IT companies use to remotely manage and support technol...
It doesn’t matter if you are a small locally-owned business or a larger-scale enterprise. Network security is equally important, as all businesses by default collect valuable information for hackers. It makes sense to protect your valuable assets, an...
According to a survey conducted by Splunk and Enterprise Strategy Group, more business leaders intend to funnel funding into their cybersecurity—88 percent of respondents reporting a planned increase into their investments, 35 percent reporting that ...

Android device users rely on the Google Play Store to source applications, but many may not be aware of the controls and features that the Play Store has to offer. Let’s go over some of these features that could prove useful.

Windows 10 has long played nice with the Android platform, but did you know that there is a way that you can actually use the same apps you would find on your mobile device on your PC? For this week's tip, we'll go over how you can enable this capabi...
With smartphones becoming more expensive every year, the top offerings from major manufacturers price some out of the market. This provides an opportunity for these companies to offer budget smartphones to a growing market of people who don’t want to...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our office in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

White Mountain IT Services
33 Main Street, Suite 302
Nashua, New Hampshire 03064

 

603-889-0800

map nashua4 1

 

Open Positions