About: Shedun     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : owl:Thing, within Data Space : dbpedia.demo.openlinksw.com associated with source document(s)
QRcode icon
http://dbpedia.demo.openlinksw.com/c/6zXmLzTTTE

Shedun is a family of malware software (also known as Kemoge, Shiftybug and Shuanet) targeting the Android operating system first identified in late 2015 by mobile security company , affecting roughly 20,000 popular Android applications. Lookout claimed the HummingBad malware was also a part of the Shedun family, however, these claims were refuted. Avira Protection Labs stated that Shedun family malware is detected to cause approximately 1500-2000 infections per day.All three variants of the virus are known to share roughly ~80% of the same source code.

AttributesValues
rdfs:label
  • Shedun (in)
  • Shedun (en)
rdfs:comment
  • Shedun is a family of malware software (also known as Kemoge, Shiftybug and Shuanet) targeting the Android operating system first identified in late 2015 by mobile security company , affecting roughly 20,000 popular Android applications. Lookout claimed the HummingBad malware was also a part of the Shedun family, however, these claims were refuted. Avira Protection Labs stated that Shedun family malware is detected to cause approximately 1500-2000 infections per day.All three variants of the virus are known to share roughly ~80% of the same source code. (en)
  • Shedun adalah nama dari keluarga virus ponsel (dikenal juga dengan Kemoge, Shiftybug, dan Shuanet) yang menyasar sistem berbasis Android. Aksi Shedun terungkap pada 2015 oleh perusahaan keamanan ponsel Lookout, dan diperkirakan menginfeksi 20.000 aplikasi populer Android. Avira Protection Labs menyatakan bahwa keluarga Shedun menginfeksi 1.500-20.000 ponsel per hari. Semua varian dari keluarga Sheldun memiliki kesamaan kode sumber sekitar 80%. Malware ini terdeteksi pada 26 tipe perangkat keras berbasis Android baru yang dibuat di Tiongkok, seperti ponsel pintar dan tablet. (in)
dct:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
sameAs
dbp:wikiPageUsesTemplate
has abstract
  • Shedun adalah nama dari keluarga virus ponsel (dikenal juga dengan Kemoge, Shiftybug, dan Shuanet) yang menyasar sistem berbasis Android. Aksi Shedun terungkap pada 2015 oleh perusahaan keamanan ponsel Lookout, dan diperkirakan menginfeksi 20.000 aplikasi populer Android. Avira Protection Labs menyatakan bahwa keluarga Shedun menginfeksi 1.500-20.000 ponsel per hari. Semua varian dari keluarga Sheldun memiliki kesamaan kode sumber sekitar 80%. Aksi Shedun dimulai dengan "membungkus kembali" aplikasi Android asli (seperti Facebook, Twitter, WhatsApp, Candy Crush, Google Now, dan Snapchat) dengan ditambah adware, kemudian diedarkan melalui situs unduhan aplikasi pihak ketiga. Ketika diunduh dan dipasang oleh korbannya, aplikasi-aplikasi tersebut tetap berjalan seperti biasa, tetapi korban mengeluhkan munculnya iklan mengganggu (laba dari iklan tersebut mencapai $2 per pemasangan). Malware ini bercokol sedemikian kuat, hingga jalan satu-satunya adalah me-root ponsel korban dan memasang kembali ROM pabrik. Malware ini terdeteksi pada 26 tipe perangkat keras berbasis Android baru yang dibuat di Tiongkok, seperti ponsel pintar dan tablet. Keluarga malware ini juga diketahui memiliki kemampuan auto-root menggunakan celah keamanan seperti ExynosAbuse, Memexploit, dan Framaroot dan memasang dirinya sendiri sebagai aplikasi sistem dan membuat salinan dirinya di partisi sistem, sehingga "setel ulang ke pabrikan" tidak dapat mengatasi malware ini. Keluarga malware ini sering kali memasang aplikasi adware lain tanpa seizin korbannya, sehingga diklasifikasikan sebagai "adware agresif" karena sering memasang "aplikasi yang tak diinginkan" sekaligus membombardir ponsel korban dengan iklan. (in)
  • Shedun is a family of malware software (also known as Kemoge, Shiftybug and Shuanet) targeting the Android operating system first identified in late 2015 by mobile security company , affecting roughly 20,000 popular Android applications. Lookout claimed the HummingBad malware was also a part of the Shedun family, however, these claims were refuted. Avira Protection Labs stated that Shedun family malware is detected to cause approximately 1500-2000 infections per day.All three variants of the virus are known to share roughly ~80% of the same source code. In mid 2016, arstechnica reported that approximately 10.000.000 devices would be infected by this malware and that new infections would still be surging. The malware's primary attack vector is repackaging legitimate Android applications (e.g. Facebook, Twitter, WhatsApp, Candy Crush, Google Now, Snapchat) with adware included. The app which remains functional is then released to a third party app store; once downloaded, the application generates revenue by serving ads (estimated to amount to $2 US per installation), most users cannot get rid of the virus without getting a new device, as the only other way to get rid of the malware is to root affected devices and re-flash a custom ROM. In addition, Shedun-type malware has been detected pre-installed on 26 different types of Chinese Android-based hardware such as Smartphones and Tablet computers. Shedun-family malware is known for auto-rooting the Android OS using well-known exploits like ExynosAbuse, Memexploit and Framaroot (causing a potential privilege escalation) and for serving trojanized adware and installing themselves within the system partition of the operating system, so that not even a factory reset can remove the malware from infected devices. Shedun malware is known for targeting the Android Accessibility Service, as well as for downloading and installing arbitrary applications (usually adware) without permission. It is classified as "aggressive adware" for installing potentially unwanted program applications and serving ads. As of April 2016, Shedun malware is considered by most security researchers to be next to impossible to entirely remove. Avira Security researcher Pavel Ponomariov, who specializes in Android malware detection tools, mobile threat detection, and mobile malware detection automation research, has published an in-depth analysis of this malware. The countries most infected by this virus were in Asia including China, India, Philippines, Indonesia and Turkey. (en)
prov:wasDerivedFrom
page length (characters) of wiki page
foaf:isPrimaryTopicOf
is Link from a Wikipage to another Wikipage of
is foaf:primaryTopic of
Faceted Search & Find service v1.17_git147 as of Sep 06 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3331 as of Sep 2 2024, on Linux (x86_64-generic-linux-glibc212), Single-Server Edition (378 GB total memory, 55 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software