• Home
  • Apps
  • Apps News
  • GhostCtrl Backdoor Worm Can Hijack Your Android Device to Spy on You: Trend Micro

GhostCtrl Backdoor Worm Can Hijack Your Android Device to Spy on You: Trend Micro 5v61k

GhostCtrl Backdoor Worm Can Hijack Your Android Device to Spy on You: Trend Micro
Highlights
  • Researchers have found the a new malware called GhostCtrl
  • It secretly takes full control of a device’s functionalities
  • It can also reset s and change other important settings
ment

Google's Android platform has in the past been victim to a host of malware, ransomware, and malicious attacks. In the recent past, reports related to malware named Trend Micro have revealed a backdoor worm that stealthily control several functionalities of infected Android devices. If this doesn't sound alarming enough, the researchers have further added that this vulnerability will continue to evolve while secretly recording audio or voice and send to the attacking server in an encrypted manner. 1c4u1x

The researchers have explained that the GhostCtrl Android malware has three versions wherein the first can pilfer device information and control some of its functionalities, the second can add more features to favour an imminent device hijack, and the third combines the best of the earlier two and adds more features. Notably, the GhostCtrl worm is an extension of the vulnerability that impacted Israeli hospitals earlier and the ill-famed OmniRAT platform that was in news way back in 2015 for claiming massive exploits and remote-controlling Windows, Linux, and Mac systems via any Android device and vice versa.

The GhostCtrl backdoor masquerades as a legitimate app such as WhatsApp, and the popular Pokemon Go. As soon as the app is launched, it progresses to install a malicious APK package under the hood. The malicious APK is actually concealed under a wrapper APK, which will ask the to install it. After this is executed, the attackers will be able to retrieve all the data and take the control of the device by harnessing a range of commands without the 's acknowledgement.

The Trend Micro report highlights some of the commands/ executable actions that allows the attackers to manipulate the device's functionalities. Besides controlling basic functions on the devices, the GhostCtrl can also reset s, change and play different sounds on the device. "The data GhostCtrl steals is extensive, compared to other Android info-stealers. Besides the aforementioned information types, GhostCtrl can also pilfer information like Android OS version, name, Wi-Fi, battery, Bluetooth, and audio states, UiMode, sensor, data from camera, browser, and searches, service processes, activity information, and wallpaper," reads the report.

In order to curb the GhostCtrl and other similar worms, Trend Micro has detailed a list of measures that the should take to ensure data safety. A few of them include updating the device to the latest firmware, backing up the data within certain intervals, and restricting permissions for apps. s can also switch to multi-layered security mechanisms for better data management.

Comments

For the latest reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: Backdoor
Microsoft's Path Guide App Lets You Navigate Indoors Without GPS, Wi-Fi
Game of Thrones Season 7 Premiere Had an Actual Quote From The Last of Us
Facebook Gadgets360 Twitter Share Tweet Snapchat LinkedIn Reddit Comment google-newsGoogle News

ment

Follow Us

ment

© Copyright Red Pixels Ventures Limited 2025. All rights reserved.
Trending Products »
Latest Tech News »