У нас вы можете посмотреть бесплатно Android Malware BadBox 2.0 Turns Your Network into a Hacker's Playground | How to Protect Yourself? или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
A new round of malware is making its way through affordable Android devices like IoT products and smart TVs. ~~~~~ Hi! Don't forget to like the video, subscribe to the channel, and hit the "Thanks" button on this video, if you can, and join our channel community here - / @explainingandroid Video Description ~~~~~~ Last week, the FBI issued an urgent warning to anyone who has purchased an ultra-cheap Android device lately. Some of these have been known to have malware pre-installed directly from the factory, with something called BADBOX 2.0 There are limited ways to detect if this malware is already in your network. But after going over the details about how BadBox 2.0 works and what it does. I'll then show you some device models and domain names that you can keep your eye out for. BADBOX 2.0 Operations BADBOX was first assigned to a malware strain back in 2016 with the help from researchers at Kaspersky Lab. The team called it "one of the most advanced mobile Trojans" they had ever encountered but eventually Google got around to blocking the methods it was using. But a few years later, Google announced BADBOX had come back. Except this time, it was being pre-installed on thousands of devices manufactured in China. Enabling hackers to earn money from advertising fraud schemes, residential proxy services, and the creation of fake Gmail and WhatsApp accounts. In March of this year, Google and a collection of other companies tried to disrupt BADBOX 2.0 operations by blocking ad fraud campaigns, terminating publisher accounts associated with the malware, redirecting traffic to benign servers, and even adding some additional protection layers to Google Play Protect. These efforts helped to uncover a malicious botnet comprised of over 500,000 infected hosts. So you can understand how this has spread from the original piece of malware close to 10 years ago. How to Protect Yourself? Human Security, a research team that has been working closely throughout this campaign, has released a set of model numbers for Android set-top boxes that are spreading this malware. So you can go and check any no-name Android devices you have purchased in the last decade. They have also published a list of domain names that are associated with this fraud campaign. So, if you're using a local DNS server. . .or if your router is logging all internet connections, then you could reference those logs to these domain names. Or you could add all of these domain names to a blacklist of sorts. Others are suggesting that you keep your eye out for unknown app stores being installed on any Android device you have on the network. They want you to make sure you have Google Play Protect installed and enabled on each of these devices. If you notice setting or features being changed or toggled without you doing so yourself. Then that's something you should be worried about. And some have said noticing an Android device overheating or showing signs of constant CPU usage can also be a red flag that you should be keeping your eye on. An important thing to remember, though, is that you should not trust a factory data reset to fix these issues. The malware here is being installed from the factory and they've done so in a way that makes sure it is reinstalled when things are erased like this. So your best bet is to throw the device away entirely. conclusion When you come across a deal that is too good to be true. . .then it's usually best to trust your instincts because that means there's a reason why it's such a great deal. And the same can be said about these ultra-cheap tablets and set-top boxes with Android installed. If these cost $50 to make. . .and they're only being sold for $25. . .then they're going to make up that difference somewhere. Whether that's through ads embedded within the software. . .or malware conducting these ad fraud schemes. #android #android16 #android15 #androidsecurity And I'm not going to tell you to stop looking for deals. I just want you to be aware of what you're putting in your home. So I hope the next time you get a great deal on a tablet or a new phone. . .but notice it has some brand name attached to it that you've never heard of before. . .then you'll know to watch out for unexpected behavior from it. Summary ~~~~~ 1. Intro [00:00] 2. What is the BADBOX 2.0 Android Malware and How Does it Work? [00:56] 3. How do protect yourself from BADBOX 2.0? [02:50] 4. Conclusion [05:51] As an Amazon associate, I may earn a commission on sales from the links below. The Gear I Use ~~~~~ 5W "Slow" Charger - https://amzn.to/2OaUMV8 Fast Charger - https://amzn.to/3rtBsC6 MicroUSB Cable - https://amzn.to/38dkpeM USB-C Cable - https://amzn.to/2OqlTvi TPU Cases - https://amzn.to/38g9b9w USB-C to 3.5mm Dongle - https://amzn.to/3rVt7c3 USB-C to 3.5mm DAC - https://amzn.to/3CyksSJ NVIDIA Shield TV - https://amzn.to/4cZFaJz Telescopic Controller - https://amzn.to/3uDrvY9