¡Vd. usa un navegador obsoleto!
Es posible que la página no se visualice correctamente.
El análisis de tecnologías usadas por los malintencionados nos permite sacar conclusiones sobre los posibles vectores de desarrollo de la industria antivirus y afrontar las futuras amenazas con mayor eficacia. Entérese de cómo funcionan varios programas nocivos en sistemas infectados y cómo afrontarlo.
Program.FakeMoney virus records are used to detect fraudulent applications that are positioned as online money-generating instruments. Users of such software do not actually receive the payments promised to them and risk having their personal data exposed by filling in special money withdrawal forms.
Most often potential victims are offered the opportunity to perform various tasks. This includes watching video clips and advertisements, writing reviews on certain sites and for certain services, and installing games and apps, to name a few. After successfully completing tasks, users receive a reward, which typically comes in the form of virtual currency. In theory, this reward can be converted into real money or exchanged for valuable consumer goods. In practice, however, when dealing with such apps, users risk encountering numerous problems.
First, these apps may initially set a high minimum number of rewards that must be collected in order to initiate the withdrawal process. With that, the reward for completing tasks is, on the contrary, set low to impede the user from collecting the necessary amount too soon. This effectively will delay the “payments” for as long as possible. As a result, users will waste significantly more resources—like time, internet traffic, and electricity—on completing tasks in comparison with the income they expect.
Second, the money withdrawal process itself can be artificially made complicated or absent altogether. For instance, users may be told that their request is in a queue, that the payment system or bank involved requires more time to process the request, or that there was an unexpected error.
Third, the tasks offered can pose a potential threat. For example, malicious actors can disguise trojan applications as harmless games that must be installed for a reward. And the ads displayed may propose illegal items and goods or fraudulent websites.
Según las estadísticas, cada quinto programa para el SO Android tiene vulnerabilidades, lo cual les permite a los malintencionados implementar los troyanos móviles en el dispositivo y realizar las acciones necesarias.
Auditor de seguridad en Dr.Web para Android diagnosticará y analizará la seguridad de un dispositivo móvil, ofrecerá soluciones para resolver los problemas y las vulnerabilidades encontrados.