Nasty Android malware reinfects its targets, and no one particular is aware of how
A commonly circulating piece of Android malware mostly concentrating on US-centered telephones utilised a clever trick to reinfect 1 of its targets in a feat that stumped scientists as to exactly how it was pulled off.
xHelper came to mild final May when a researcher from safety organization Malwarebytes published this short profile. 3 months afterwards, Malwarebytes offered a deeper analysis following the company’s Android antivirus app detected xHelper on 33,000 devices primarily situated in the US, generating the malware just one of the top Android threats. The encryption and hefty obfuscation manufactured evaluation challenging, but Malwarebytes scientists finally concluded that the main function of the malware was to act as a backdoor that could remotely obtain instructions and install other apps.
On Wednesday, Malwarebytes posted a new write-up that recounted the lengths one Android person took to rid her machine of the destructive application. In short, every single time she eradicated two xHelper variants from the unit, the malware would reappear on her system in just the hour. She reported that even doing a manufacturing facility reset wasn’t plenty of to make the malware go absent.