Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severityĪnd 1 is the lowest level of severity. The following fields listed on the Threat Meter containing a specific value, are explained in detail Remove a threat or pursue additional analytical research for all types of computer users. The Threat Meter is a useful tool in the endeavor of seeking a solution to The scoring forĮach specific malware threat can be easily compared to other emerging threats to draw a contrast in The overall ranking of each threat in the Threat Meter is a basicīreakdown of how all threats are ranked within our own extensive malware database. You a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count, Specific malware threats to value their severity, reach and volume. Our Threat Meter includes several criteria based off of
Also, never tap on links in messages and always be mindful of your Android apps' permissions," Bitdefender researchers advised in the blog post.The Threat Meter is a malware assessment that 's research team is able to
"Never install apps outside the official store. The campaign remains active and, while many of the methods of distribution outside the fake Ad Blocker remain unknown, there are precautions that users can take to avoid becoming a victim. TeaBot appears to concentrate much of its targeting on Western Europe, with Spain and Italy the current hotspots for infections – although users in the UK, France, Belgium, the Netherlands and Austria are also frequent targets.
The method of infection might appear convoluted, but dividing it over a number of steps makes it less likely that the malware will be detected. It's clicking this link that downloads TeaBot onto the device.
However, these hidden apps will repeatedly show phoney adverts – ironically, often claiming that the smartphone has been damaged by a malicious app – that encourage the user to click a link for the solution. The fake ad blocker doesn't have any real functionality, but asks for permissions to display over other applications, show notifications and install apps from outside Google Play – these are fake apps that are hidden after they're installed. One of the ways the victims are driven towards the malicious apps is via a fake ad blocker app that acts as a dropper – although it's unknown how victims are directed towards the ad blocker in the first place. The malicious apps aren't being distributed by the official Google Play Store, but are hosted on third-party websites – although many of the ways people are directed to them still remains a mystery to researchers. The malicious versions of the apps use slightly different names and logos to the real ones.
SEE: Cybersecurity: Let's get tactical (ZDNet/TechRepublic special feature) | Download the free PDF version (TechRepublic)Īs detailed by cybersecurity researchers at Bitdefender, these include phoney versions of Android apps including antivirus apps, the VLC open-source media player, audiobook players and more.
The authors of TeaBot attempt to trick victims into downloading the malware by disguising it as fake versions of popular apps, the real versions of which have often been downloaded millions of times. The malware first emerged in December last year and the campaign remains active.