09
Jun

Judy Malware on Android: 36.5 Million Android Users Affected Globally

Judy Malware on Android: 36.5 Million Android Users Affected Globally

As the world still fights the effects of the WannaCry Ransomware attack, it’s a new malware that is taking over Android phones. The wanna cry attack was spread across the globe and affected most of the Government departments of nearly 100 Countries. Judy Malware is an auto-clicking adware that uses infected devices to generate huge amounts of fraudulent clicks on advertisements. It generates revenues for the perpetrators behind it. Some of the infected applications were there for several years on the play store. It has affected around 36.5 Million Android phone users around the world. The malicious Apps reached a surprising count between 4.5 million and 18.5 million downloads. This malware has been there on Google Play Store almost for a year. At least 41 applications have been found affected by the virus. These applications were developed by a Korean Company Kinwini. On Google Play Store, it has been labeled as ENISTUDIO Corp.

As the actual spread of the malware remains unknown, it is unclear how long the malicious code existed inside the apps. The virus was detected by Checkpoint and they found that several apps, developed by different developers, were also infected with the virus. The connection is still unknown but it is possible that the code was borrowed knowingly or unknowingly.

How Does Judy Malware Affect Your Android?

Now the question that rises here is how Judy Malware affects your Android. This is the most important question to be asked to protect the gadget you use to carry out maximum work. As told earlier, it is malware that generates auto-click on fake links which further creates revenues for the mobile app developers behind such apps. It is to be noted that, unlike other malware, it is not stealing your data. In fact, it is controlling the device to carry out fraudulent activities. This malware takes control of infected devices and relies on communication with its command and control server for its operation.

Applications on Android Infected with the Judy Malware:

Here comes the most important part and that is how you can protect your smart phone from malware. You would never like your phone to be affected by malware. Therefore, you should take different measures to keep any kind of malware that can affect your gadget. Keeping your software updated is the finest way to avoid any kind of virus. Though Google is removing all the infected apps from the Play Store, it is very important for you to take measures to protect your gadget. Here is the list of the apps that were infected.

Here is the list of the Android Apps that were infected.

Fashion Judy: Wedding day Chef Judy: Birthday Food Maker
Fashion Judy: Waitress style Fashion Judy: Snow Queen style
Chef Judy: Character Lunch Animal Judy: Persian cat care
Chef Judy: Picnic Lunch Maker Fashion Judy: Pretty rapper
Animal Judy: Rudolph cares Fashion Judy: Teacher style
Judy’s Hospital: Pediatrics Animal Judy: Dragon care
Fashion Judy: Country style Chef Judy: Halloween Cookies
Animal Judy: Feral Cat care Fashion Judy: Wedding Party
Fashion Judy: Twice Style Animal Judy: Teddy Bear care
Fashion Judy: Myth Style Fashion Judy: Bunny Girl Style
Animal Judy: Fennec Fox care Fashion Judy: Frozen Princess
Animal Judy: Dog care Chef Judy: Triangular Kimbap
Fashion Judy: Couple Style Chef Judy: Udong Maker – Cook
Animal Judy: Cat care Fashion Judy: Uniform style
Fashion Judy: Halloween style Animal Judy: Rabbit care
Fashion Judy: EXO Style Fashion Judy: Vampire style
Chef Judy: Dalgona Maker Animal Judy: Nine-Tailed Fox
Chef Judy: ServiceStation Food Chef Judy: Jelly Maker – Cook
Judy’s Spa Salon Chef Judy: Chicken Maker
Chef Judy: Hotdog Maker – Cook Animal Judy: Sea otter care
Animal Judy: Elephant care

 

share

Best Tips for Mobile Application Security

Best Tips for Mobile Application Security

previous-blog-arrowPrevious
Understand PHP 7 New Features In Easiest Way

Understand PHP 7 New Features In Easiest Way

next-blog-arrowNext