In February, a researcher detailed a widely circulating Android backdoor that’s 
so pernicious that it survives factory resets, a trait that makes the malware 
impossible to remove without taking unusual measures.

The analysis found that the unusual persistence was the result of rogue folders 
containing a trojan installer, neither of which was removed by a reset. The 
trojan dropper would then reinstall the backdoor in the event of a reset. 
Despite those insights, the researcher still didn’t know precisely how that 
happened. Now, a different researcher has filled in the missing pieces. More 
about that later. First, a brief summary of xHelper.

https://arstechnica.com/information-technology/2020/04/solved-how-android-backdoor-called-xhelper-survives-factory-resets/





_______________________________________________
Medianews mailing list
[email protected]
http://etskywarn.net/mailman/listinfo/medianews_etskywarn.net

Reply via email to