Logo en.cybercomputersol.com
  • Upgrades
  • Apps
  • Comparisons
  • Releases
  • Offers
  • Operators
  • Prices
  • Rumors
  • Tricks
  • Various
  • Android Applications
  • Games
  • General
  • GPS
  • IPhone Apps
  • Messages
  • Pages
  • Photography
  • Tutorials
  • Utilities
Logo en.cybercomputersol.com
  • Upgrades
  • Apps
  • Comparisons
  • Releases
Home | Various

More than half of android phones at risk from ghost push virus

2025

Table of contents:

  • How does Ghost Push work?
  • Update to be safe
Anonim

The name of the Ghost Push may not be recognized by many, but it is in fact one of the most virulent Royans to ever pass through the Android world. Appeared more than a year ago, it infected almost a million devices at the time and raised 4 million euros a day in stolen data and money in accounts. Most of the affected apps were eliminated when the contagion became news, and it was assumed that the malware was under control, but the truth is that it is not entirely so. To this day it is still active and works on all mobile devices that have aAndroid 5.0 Lollipop operating system or lower, which today is estimated to be 57% of phones. The release of Android 6.0 Mashmallow included software that prevented compatibility with this Trojan, so its days are numbered for newer phones. Even so, for more than half of Android phones it still poses a threat that must be taken into account, even if it is not newsflash. It is true that its margin of activity has been less since its existence was detected, but as it is especially pernicious software, giving the alarm signal never hurts so that the user is warned.

How does Ghost Push work?

The Ghost Push, as a good Trojan, is characterized by making its appearance in the form of another legitimate application. Thus, at its time of activity we could find it in up to 90 applications from stores such as Play Store or Aptoide, such as Amazon, Assistive Touch or Smart Touch. What happens when you install them? Trojan is done with the control of your device, and the hacker who owns it can access all data available on the same, from photographs to passwords social networking as bench applications as well as having the ability to installnew applications that may aggravate the state of 'hack'. By entering the root system, its elimination is quite complicated once the contagion has been made. After learning of its existence, Google Play eliminated (supposedly) all the affected applications, and today most of the threats come through unofficial Android application download platforms, since they have less ability to control the applications Uploaded by developers and companies for later download or sale.

Update to be safe

If your phone allows you to update the operating system to Android 6.0 Marshmallow and you have not done so yet, do not hesitate to do so, because it can save you from a severe infection. If it does not allow you, you simply have to be aware of the user reviews of the applications you download in the Play Store, and try not to download anything outside of it. If you also install an antivirus, you will be able to know if you have an infected system and be protected against possible infections. All care is little.

More than half of android phones at risk from ghost push virus
Various

Editor's choice

Angry Birds

2025

Payments for add-ons within the application itself will grow in 2011

2025

Facebook

2025

Dropbox

2025

WhatsApp

2025

Evernote

2025

Editor's choice

  • Angry Birds

  • Payments for add-ons within the application itself will grow in 2011

  • Facebook

Editor's choice

  • Angry Birds

  • Payments for add-ons within the application itself will grow in 2011

  • Facebook

Editor's choice

  • Angry Birds

  • Payments for add-ons within the application itself will grow in 2011

  • Facebook

  • Upgrades
  • Apps
  • Comparisons
  • Releases
  • Offers
  • Operators
  • Prices
  • Rumors
  • Tricks
  • Various
  • Android Applications
  • Games
  • General
  • GPS
  • IPhone Apps
  • Messages
  • Pages
  • Photography
  • Tutorials
  • Utilities

© Copyright en.cybercomputersol.com, 2025 May | About site | Contacts | Privacy policy.