Breaking NewsCurrent AffairsIndia

Android users need to beware ‘Black Rock’: CERT India

New Delhi: The Computer Emergency Response Team of India (CERT-In) of the Ministry of Electronics and Information Technology has warned the Android users in India that a malware ‘Black Rock’ is roaming in the cyberspace, with the ability to steal critical banking and other confidential data of smart phone users.

The CERT-In, in its advisory, said that this malware can extract credentials and credit card information from over 300 apps like email, e-commerce apps, social media apps, besides banking and financial apps.

”The attack of this malware is of ‘Trojan’ category virus and is active globally. It is reported that a new Android malware strain dubbed ‘BlackRock,’ equipped with data stealing capabilities, is attacking a wide range of Android applications,” the national technology arm to combat cyber attacks and guard Indian cyber space, said.

The CERT-in advisory also explained that this malware can target around 337 applications, including banking and financial applications, and also non-financial and well-known commonly used brand name apps on an Android device that focusses on social, communication, networking and dating platforms.

Suggesting some counter measures to remain safe from this malware, the Electronic Ministry’s Cyber guard said, ”Do not download and install applications from untrusted sources and use only reputed application market only.

”Always review the app details, number of downloads, user reviews and check ‘additional information section before downloading an app from play store, use device encryption or encrypt external SD card and avoid using unsecured, unknown Wi-Fi networks.

”Also, when it comes to downloading banking apps, one should use the official and verified version and users should make sure they have a strong AI-powered mobile antivirus installed to detect and block this kind of tricky malware,” it added.

Savio Rodrigues

Savio Rodrigues Founder & Editor-in-Chief
Back to top button

Adblock Detected

Please consider supporting us by disabling your ad blocker