Hackers are using highly powerful malicious software to get access to Android powered mobile devices. This news has been revealed recently by mobile security firm Lookout. According to Lookout, the malware used for these operations is called NotCompatible.
Jeremy Linden, a senior security researcher at Lookout, said that NotCompatible scores heavily in departments like sophistication and persistence and stands as the testimony of the fact that hackers are nowadays attacking tablets and smartphones with the same tenacity and tactics that were originally reserved for the desktop computers.
Linden added that the past few years have seen mobile turning into the most dominant computing device, and that’s probably the main reason why it has become the primary target of cyber criminals. He said that mobile malware is undergoing quick improvements and rapidly becoming as powerful as PC malware.
NotCompatible, according to reports, is capable of mining call logs, captured images and places visited by the users from the hacked smartphones. Linden said this malware is a real jackpot for people looking to get hold of valuable data from someone’s mobile device, and this ability of the malware has made it the most wanted component for bad guys.
According to Lookout, NotCompatible is primarily meant for taking control of the attacked device and not for pilfering the data in it. Lookout reported that he malware uses multiple enslaved smartphones and tablets to send spam hawking merchandises like diet pills, or to snatch up concert tickets once they are made available so that the hackers can later sell them for much higher prices.
The criminals who operate these networks of hacked tablets and smartphones seem to be renting out “botnets” for unleashing hundreds of thousands of email advertisements, attacking websites and doing many such other jobs.
Linden informed that the procedure the virus uses most frequently to enter smartphones and tablets is visiting a legitimate website, which has been hacked and later booby-trapped in order to infect visitors secretly.
NotCompatible usually arrives as a system update for the Android operating system. It asks users’ permission for installing itself into their respective mobile devices. The easiest and best way of safeguarding your mobile device from such malware attacks is by declining any such prompt; the right way of getting system updates is by checking smartphone setting for system updates.
NotCompatible was first detected in 2012; but the version hackers are using now is much more sophisticated and powerful, which makes it a bigger concern for security firms and mobile device users.