The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Program.FakeMoney virus records are used to detect fraudulent applications that are positioned as online money-generating instruments. Users of such software do not actually receive the payments promised to them and risk having their personal data exposed by filling in special money withdrawal forms.
Most often potential victims are offered the opportunity to perform various tasks. This includes watching video clips and advertisements, writing reviews on certain sites and for certain services, and installing games and apps, to name a few. After successfully completing tasks, users receive a reward, which typically comes in the form of virtual currency. In theory, this reward can be converted into real money or exchanged for valuable consumer goods. In practice, however, when dealing with such apps, users risk encountering numerous problems.
First, these apps may initially set a high minimum number of rewards that must be collected in order to initiate the withdrawal process. With that, the reward for completing tasks is, on the contrary, set low to impede the user from collecting the necessary amount too soon. This effectively will delay the “payments” for as long as possible. As a result, users will waste significantly more resources—like time, internet traffic, and electricity—on completing tasks in comparison with the income they expect.
Second, the money withdrawal process itself can be artificially made complicated or absent altogether. For instance, users may be told that their request is in a queue, that the payment system or bank involved requires more time to process the request, or that there was an unexpected error.
Third, the tasks offered can pose a potential threat. For example, malicious actors can disguise trojan applications as harmless games that must be installed for a reward. And the ads displayed may propose illegal items and goods or fraudulent websites.
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.
© Doctor Web
2003 — 2023
Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies
Doctor Web in social networksLink accounts