The page may not load correctly.
分析不法分子使用的技术可以使我们预测其可能的发展方向,以便更加有效地抵御今后可能遇到的威胁。您也可以了解一下恶意程序如何在被感染的系统中运行以及如何抵御这些程序。
Programs detected as Android.Plankton contain the SDK code (Software Development Kit) of one advertising network used to monetize Android applications. These programs can gather various device-related information (for example, phone number and IMEI) and send it to a remote server. Moreover, they can add bookmarks in a browser and change its start page, create shortcuts on the Home Screen, download and install additional programs, and so on.
An advertising module is implemented as a service that launches once an original application is run. Once the service is active, confidential information is gathered and sent to the server. The server issues commands based on this information. In particular, the module can receive an URL to download and install APKs that look as follows: plankton_v[package.version].jar (for example, plankton_v0.0.3.jar and plankton_v0.0.4.jar). These applications, which are also detected as Android.Plankton, serve the purpose of executing commands received from the command and control server. The packages launch using the DexClassLoader method that allows dynamic load of programs into the RAM without an appropriate prompt being displayed.
Later modifications of the SDK cannot download additional program packages and do not have some other features. However, they are still unwanted for the majority of users and, therefore, these later modifications are detected not as malware but as adware applications under the name of Adware.Startapp.
据统计,每五个安卓程序中就有一个存在漏洞(换句话说就是带有缺陷),这种漏洞可使不法分子将移动木马成功嵌入设备并执行所需操作。
Dr.Web for Android中的安全审计 对移动设备的安全性做出诊断和分析,发现问题和漏洞是会提示解决方案。