It is stated that devices infected by this malware can be hijacked and applications on the victim’s smartphone such as contacts, SMS, to data such as call lists, cameras, and locations can all be accessed by the Trojan. “This is a significant discovery because the malware is widely distributed and has root capability which is currently quite rare for the last five years,” said Kristina Balaam and Paul Shunk of Lookout. Of the 19 applications detected by Lookout, it revealed the names of 7 applications that present the most dangerous threats because they can root the victim’s device.
Here is the list:
Lookout also appeals to smartphone users who feel they have installed the application to quickly delete it so they don’t become victims of the Trojan malware.