CopyCat Malware Affects 14 Million Devices
A scary malware has taken a hold of 14 million Android users’ devices. Could you be next? Find out more about this dangerous malware now.
We’re all aware that our mobile devices are at risk of being hacked at any given moment, but when that fear becomes a reality, it can be hard to face. These malicious attacks are serious, and allowing them to take a hold of your device is an unwanted headache that you don’t want to deal with. To negate the possibility of an attack, it’s important to take advantage of DFNDR’s various anti-virus features to protect your device. Click here to use the Full Virus Scan to check your device for hidden malware:
The CopyCat Malware
A newly uncovered malware strain, dubbed “CopyCat,” has infected more than 14 million Android users around the world, drawing in approximately $1.5 million in fake advertisements in only two month’s time. This malware has the ability to root infected devices, to establish persistency, and to inject malicious code into Zygote. This is a daemon that is capable of launching apps on Android and allowing hackers full access to the infected devices.
Most of the victims of this malicious attack reside in South and Southeast Asia. However, more than 280,000 Android devices in the U.S. have been affected by this malware. Experts believe that millions were infected with this malware through third-party app downloads as well as phishing attacks. To protect your device from this type of malware, make sure to only download apps from Google Play, and to use our Anti-Hacking feature to protect your device from phishing attempts and malicious websites:
This malware works by disguising itself as a popular and trusted Android app that users choose to download from third-party stores. Once it is added onto a device, the malware begins to collect data from the phone; it then downloads rootkits to root itself within the smartphone, which proves to be the window to more information and power.
After that, the malware removes the device’s security defenses, injects a code into the Zygote app, and launches a process to fraudulently install apps and display fake ads. When these ads are clicked on, they generate revenue. The tricky thing about these ads is that CopyCat abuses the Zygote process and works to display these fake ads while hiding their origins. That means that Android users cannot understand what causes these pop-up ads, meaning that they also don’t know how to stop them.