{"id":8617,"date":"2017-03-08T15:00:25","date_gmt":"2017-03-08T20:00:25","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=8617"},"modified":"2017-03-13T15:09:03","modified_gmt":"2017-03-13T20:09:03","slug":"rootnik-malware-means","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/rootnik-malware-means\/","title":{"rendered":"Rootnik Malware and What It Means For You"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">There\u2019s a new type of malware infecting Android devices. It&#8217;s being called &#8220;Rootnik&#8221; and it has infected Android users in multiple different countries. Unfortunately, it is being hidden across many different free apps that can be found on the Google Play Store. Wi-Fi Analyzer, Open Camera, Infinite Loop, HD Camera, and many other applications have been found to have Rootnik embedded within them \u2014 and these are just the apps that we know about. Many other apps could also have Rootnik hidden inside of them. It could even be inside an app that you&#8217;ve already installed without you even knowing about it \u2014 that\u2019s how little is known about it.<\/span><\/p>\n<p>Whenever you download a new app, be sure to scan your device for viruses after. This is especially important because of malware like Rootnik, where the number of infected apps is unknown. DFNDR\u2019s Security Scan feature will monitor the various threats as you interact with different websites or attempt to install new applications. It&#8217;s able to protect you from threats by preventing them in the first place. It provides this protection to your device storage and your SD card so you&#8217;re always protected and never in danger. Click here to run a full virus scan on your device, and check your apps for Rootnik:<\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_quick\" rel=\"attachment wp-att-7530\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-7530\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/02\/Security-Scan-300x78.png\" alt=\"Security Scan\" width=\"300\" height=\"78\" \/><\/a><\/center><b>How Does Rootnik Work?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Rootnik works in a few different ways. The first thing it does after being installed is to exploit a few different Android vulnerabilities which will allow it to install and uninstall apps without users giving permission or being aware of what it\u2019s doing. It will then install multiple new APK files in the system files. It will steal user information and Wi-Fi and location information, in addition to having the ability to download executable files from distant and remote servers. It can do all of this without you even being aware of it.<\/span><\/p>\n<p>Your mobile device is convenient because it&#8217;s connected to everything \u2014 your private network, email, banking apps, social media, etc. \u2014 and contains everything you need to have access to at a moment&#8217;s notice. The downside to this is, however, the fact that malicious websites and malware like Rootnik can also infect your device without your knowledge and steal all of this information to profit from it at your expense. It&#8217;s not a hopeless situation though; as long as you have a great security app, you can protect yourself from malware like Rootnik.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware comes in many different forms, but it&#8217;s always deceptive \u2014 and often comes hidden within other apps on the Play Store.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[2],"tags":[2649,2033,161],"class_list":["post-8617","post","type-post","status-publish","format-standard","hentry","category-performance","tag-android-device","tag-play-store","tag-virus"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/8617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=8617"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/8617\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=8617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=8617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=8617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}