{"id":6517,"date":"2013-11-17T20:54:32","date_gmt":"2013-11-18T01:54:32","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=6517"},"modified":"2013-11-17T20:54:32","modified_gmt":"2013-11-18T01:54:32","slug":"mobile-malware-reported-riding-on-google-messaging-service","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/mobile-malware-reported-riding-on-google-messaging-service\/","title":{"rendered":"Mobile malware reported riding on Google messaging service"},"content":{"rendered":"<p>You can bet when something becomes popular, some nefarious scumbag is going to exploit it. So it was with Windows, and so it is becoming with the wildly popular Android OS which powers tablets and smartphones &#8212; and in a slightly altered form (Chrome OS) laptops and Chromebooks.<\/p>\n<p>The cyber-criminals will exploit whatever is popular. And if you use an iPhone, iPad or other Apple products, you&#8217;re not immune. And Linux users who normally gloat about Windows vulnerability, should learn more about Linux. Most Web servers run Unix or Linux, hundreds, if not thousands of these servers are compromised each month. No operating system is immune to malware &#8211; it&#8217;s just the more popular operating systems that are attacked the most. Windows is number one (still) but Android is moving up fast and will, someday, overtake Windows.<\/p>\n<p>Here&#8217;s an article you should read about the malware that can be spread by text:<\/p>\n<blockquote>\n<h2 itemprop=\"name\">Mobile malware reported riding on Google messaging service<\/h2>\n<div id=\"article-meta-target\">Mobile botnets are on the rise and cybercriminals are using the Google Cloud Messaging service as a conduit for sending data from command-and-control servers to malware, a new report says.<\/div>\n<\/blockquote>\n<section>\n<blockquote><p>In its latest IT Threat Evolution report, Kaspersky Lab\u00a0<a href=\"http:\/\/www.securelist.com\/en\/analysis\/204792312\/IT_Threat_Evolution_Q3_2013#14\">said the third quarter was<\/a>&#8220;undoubtedly the quarter of mobile botnets,&#8221; as cybercriminals tried to improve the ways they manage their networks of infected Android devices.<\/p>\n<p>The latest\u00a0<a href=\"http:\/\/www.pcworld.com\/article\/2046642\/cybercriminals-use-google-cloud-messaging-service-to-control-malware-on-android-devices.html?tk=rel_news\">weapon in criminals&#8217; arsenal<\/a>\u00a0is GCM, which enables them to send short messages in the JSON format to instruct malware on Android devices. JSON, or JavaScript Object Notation, is an open standard format that uses human-readable text to transmit data from a server to Web applications.<\/p><\/blockquote>\n<p><strong><span style=\"text-decoration: underline;\"><a href=\"http:\/\/goo.gl\/GLVi7J\" target=\"_blank\">Read the rest here&#8230;<\/a><\/span><\/strong><\/p>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>You can bet when something becomes popular, some nefarious scumbag is going to exploit it. So it was with Windows, and so it is becoming with the wildly popular Android OS which powers tablets and smartphones &#8212; and in a slightly altered form (Chrome OS) laptops and Chromebooks. The cyber-criminals will exploit whatever is popular. And if you\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/mobile-malware-reported-riding-on-google-messaging-service\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[101,1669,1656],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/6517"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=6517"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/6517\/revisions"}],"predecessor-version":[{"id":6518,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/6517\/revisions\/6518"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=6517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=6517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=6517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}