The bee’s open-source programming language has been used to create malicious Android apps that are able to hijack an Android mobile, and has been found in the Google Play Shop as an Android app called Swift Cleaner.
In May 2017, Google announced that Kotlin would develop an Android application programming language, and over 17 per cent of Android Studio’s projects were using Kotlin by the Android team.
Top Giant Android applications like Netflix, Pinterest and Twitter are the top applications that use kotlin linguistic programming.
In the same language is used the “Swift Cleaner” malicious Andoird application, an Android tool for cleaning and optimizing Android devices discovered in the Google Play Store.
This malicious application that is able to click fraud, perform the remote command, and steal user information can also register customers without their consent for premium SMS subscription services.
How the Malicious is functioning–Swift Cleaner
Once you download and install this malicious application on your machine, it gathers data from your computer and sends it to your control and control server.
Later on it begins background services which continue to run on its command & control server to receive a job.
This malware sends an SMS to a certain amount that its C&C server provides when users first infect.
Later the malware gets the SMS command, remote servers will transmit the URL and also click on the ad fraud to perform the Wireless Application Protocol (WAP) task by remotely executing a C&C Server command.
It also conducts sophisticated tasks, like uploading data for service providers, CAPTCHA, and login information to C&C, by allowing premium SMS service subscription at victim expense.
Common mobile threats defenses
- Consider carefully the approval requested by the apps.
- Download trusted source apps.
- Keep the recent version up.
- Encrypt your phones. Encrypt your phones.
- Make significant information backups frequently.
- Install malware on your systems.
- Stay with the CIA Cycle rigid.