Is your machine at risk?

While bypassing Bouncer detection is not impossible, it is sufficient enough to keep most malware creators at bay.

However, the authors of Android.Xiny.19.origin were much more ambitious.

Beware: Some Android games host malicious code inside images

After the crafted image is downloaded, the Trojan extracts an APK from it by using a special algorithm.

It then loads the malicious code in the devices memory by using the DexClassLoader Android function.

However, when applying a decryption algorithm to it, they could recover the APK.

Games-Android-Apps-on-Google-Play-1024x492

Source:Drweb

Read More

spot_img

source: www.techworm.net