Free app lovers warned of possible trojans
All free app lovers should be very careful when downloading their favourite applications as many contain trojans in them, Eyetro Digital has learnt.
According to a local Certified Ethical Hacker and a Computer Forensics expect, Benson Sanyanga, free apps and mods like WhatsApp GB should be downloaded with great caution. He said he has just discovered a trojan that comes pre-packaged with a non-Play Store and ShareIt applications.
“It is merged through steganography,” he said.
“When installed it appears as “com.system UI”. It’s a part of bitcoin mining pool and it strains your mobile’s C.P.U and RAM.”
He said symptoms include excessive power usage, heat emission and abnormal data usage and if anyone is experiencing the above symptoms on their devices, they may be victims of the trojan and should visit their technicians.
Benson added that in the world of technology nothing is really for free and everything comes with a price. “You also have to know that nothing is really free, people spend lots of resources learning and developing those apps, so they are either adware spamming your phone with boring ads or Trojans that exploit your phone’s resources or steal your info.”
He also shared a solution to counter the symptoms.
“You root your gadget and install stubborn trojan killer on your device and it will do the rest for u. Though this sounds easy, there is a lot involved and you may brick your device during the process,” he added.
In computing, a trojan is any malicious computer program which misleads users of its true intent. Trojans are generally spread by some form of social engineering, for example where a user is duped into executing an e-mail attachment disguised to be unsuspicious or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, containing a controller which can have unauthorized access to the affected computer.
Trojans may allow an attacker to access users’ personal information such as banking information, passwords, or personal identity (IP address). It can infect other devices connected to the network. Ransom-ware attacks are often carried out using a trojan.