Malicious elements always try their best to invade users’ mobile phones to steal sensitive information. Now a network security company has discovered a new Android malware called SpyNote. The biggest purpose of this malware is to monitor users’ every move and steal sensitive information. ;The most annoying thing is that if your phone is accidentally invaded by SpyNote, you cannot easily delete it.
Cyber Security Company F-Secure Introducing the SpyNote malware on the blog. SpyNote is basically spyware that spreads through text messages or fake mobile messages that trick victims into downloading an application.
However, SpyNote does not require too many user permissions. It only requires the authorization BIND_ACCESSIBILITY_SERVICE when it is first enabled. After SpyNote obtains permissions, the malware will approve several important permissions on its own.
The trouble is, SpyNote also hides itself so Android users can’t find it in the app launcher, and SpyNote doesn’t even show up in the “Recent” column. Another troublesome ability of SpyNote is that it executes two “stubborn” services. Neither the Android system nor the victim can easily shut down the stubborn services; every time it tries to terminate the malicious program, it will be restarted.
SpyNote will collect a large amount of sensitive victim information, record and send the data to malicious parties; SpyNote can also automatically take screenshots and send them back. SpyNote can even log input, which means it can steal credentials and screen unlock passwords.
The most annoying thing is that SpyNote is different from most malware. To get rid of it, you don’t just need to delete it. Because SpyNote will be completely invisible, there is no way to find and delete it; it cannot be deleted through “Settings” because every time you enter “Settings” To search SpyNote, SpyNote will automatically close the menu screen.
The only way to get rid of SpyNote is to restore the phone to its original factory settings and discard all the saved data on the phone.
(Source of first picture:Pixabay)