A newly detected malware, called the ‘Agent Smith’ malware, has reportedly managed to affect 25 million Android devices. As per the findings of Check Point, a popular security firm, the malware replaces patches of any app’s sourcecode with its own code, and the way it operates prompted researchers to name it as “Agent Smith”. It uses highly deceptive methods to attack a device while keeping itself away from detection.
There is no data breach from this malware. If simply hacks into apps and pushes the hacked app to display more and more ads and ends up taking all the credit for the ads that have already been displayed. This means that the malware operator is the one who ends up getting all the profit from the views on the ads. The malware targets popular apps like Opera Mini, Flipkart, or WhatsApp and replaces a bit of their code with its own code and also ensures the app doesn’t get updated. Primarily, the malware has been a major menace in India as it has accounted for 15 million devices in that region.
The reason behind those numbers is the fact that it has spread through a third-party app store bookmarked usually on UC browsers called the 9Apps, which has many users in India. That doesn’t mean that US remained safe. Around 300,000 devices were attacked by the malware across the United States. The malware remains hidden in rarely used photo utility or adult apps and disguises itself as some Google app before starting off with its process of code replacement.
Talking of malwares, just two days after the ‘Agent Smith’ attack, the TrickBot malware left over 25 million devices under threat as another research indicated vulnerable security that was thwarted by the malware. The malware was called the TrickBooster and has affected users mainly in US, UK, and Canada.