Categories: Security

Top 5 spookiest malware to avoid this Halloween

Today is Halloween and aside from trick or treating and costume parties, we’re still finding ourselves face to face with security breaches that affect our personal data. There are 5 spooky malware threats lingering that remind us how important is to keep our Android’s safe. Unsure if your phone was affected? Click below to scan your device and keep your device safe.


Top 5 threats:
  1. Dresscode (downloaded 100,000 and 500,000 times)

At least 3,000 trojanized apps use this specific variant where the attacker is granted an array of personal data when victims are connected to the same network.

  1. Ghost Push

Android devices that are running version 5 or lower are the direct target to this on-going threat. The attack is spread when users download outside of the Google Play store or merely click a deceptive ad.

  1. Selfie Malware

This one masquerades as an app that asks individuals to take a selfie. During the process, the malware executes a code in the background that asks users for personal information including card info and everyone’s weakness…the selfie.

  1. GM Bot

This malware, once antiquated, has made a reboot to affect the latest versions of Android including Marshmellow. The malware creates an overlay on your Android device, logging every key-stroke users make. GM Bot even locks and blocks calls.

  1. Lockscreen Ransomware

Now in a newly powerful and resilient form, Lockscreen is keeping people from unlocking their phones on the latest versions of Android, as well as demanding a steep ransom payment.

To stop all 5 malware in its tracks, click below to scan your Android device.

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

How to identify a spy app on your smartphone

In the United States, the use of spyware apps is a growing concern, affecting mobile…

56 years ago

5 trending digital scams: how AI is making fraud more dangerous

Every day, millions of mobile phone users receive malicious links through SMS, email, or social…

56 years ago

Pix Gains Momentum Abroad: Convenience and Security for Brazilian Travelers

Travel is about new experiences — and making payments without hassle is a crucial part…

56 years ago

Malicious links: what they are and how to protect yourself

Every day, millions of  cell phone users receive malicious links via SMS, email, or social…

56 years ago

Zero Trust: what it is, why it matters, and how dfndr security protects your phone with this concept

Have you heard of Zero Trust? The term is one of the most  important trends…

56 years ago

5 Reasons to Use Biometrics to Secure Mobile Devices

Mobile devices have become essential tools in both our personal and professional lives, but they…

56 years ago