Users of Android phones have been cautioned of a new vulnerability to their devices: DO NOT CLICK ON THESE LINKS.
ANDROID users should be cautious when clicking on a URL they’ve been sent, according to experts, who warn that clicking on the wrong link can cost users of the Google mobile OS a lot of money.
If you’ve received a short URL on your Android device, you might want to reconsider clicking on it. URL shorteners are being exploited to distribute malware to Android smartphones, according to security experts. SMS trojans and banking malware are among the malicious software being sent to Android phones, with the potential to steal money from unwary users.
Lukas Stefanko, a malware researcher at ESET, wrote about the security threat in an online post.
When visitors click on a link, certain URL shorteners use “aggressive” ad strategies like scareware, according to Stefanko. Users may subsequently be directed to potentially harmful websites as a result of this.
“Monetisation means that when someone clicks on such a link, an advertisement, such as the examples in Figure 1, will be displayed, generating cash for the individual who created the shortened URL,” the ESET researcher explained.
“The issue is that some of these link shortener services use aggressive advertising techniques like scareware ads, which inform users that their devices are infected with dangerous malware, direct users to download questionable apps from the Google Play store or take part in shady surveys, deliver adult content, offer to start premium SMS service subscriptions, enable browser notifications, and so on.
These URL shorteners, according to ESET, can offer different hazards depending on which devices you’re using.
For example, iOS users may be bombarded with intrusive adverts and have events added to their calendars that spam them and fool them into clicking on unsafe links.
While Android users may be encouraged to download a malicious APK software that installs the Android/FakeAdBlocker malware, according to ESET.
This downloads and executes payloads to Android devices such as banking trojans, SMS trojans, and aggressive adware.
Android/FakeAdBlocker was first discovered in September 2019, according to ESET. The malware was downloaded over 150,000 times onto Android smartphones between then and the beginning of July this year.
By going to the Android Settings area and then to Apps, you can see if you’ve been infected with the Android/FakeAdBlocker malware.
Because the spyware lacks an emblem or a name, it should be easy to recognize.
Once you’ve completed the “Brinkwire Summary News,”