A recent surge in Android malware introduces a dangerous spyware variant known as FakeCall. This malware intercepts calls, streams your device’s screen to attackers, reads and deletes texts, and even takes photos using your camera. Cybersecurity firm Zimperium reports that FakeCall, previously identified by Kaspersky and ThreatFabric, now poses an even greater threat.
How FakeCall Works
FakeCall relies on tricking users into setting it as their default call handler. Once given this permission, the spyware gains control over all calls. It intercepts, redirects, and reroutes calls to attacker-controlled numbers, manipulating dialed numbers to deceive users into making fraudulent calls. You can find more details on the attack process in BleepingComputer.
How to Protect Your Device
To guard against FakeCall and similar threats, consider these steps:
- Do Not Change Default Call Handlers: Only allow trusted apps to act as your default call handler. The Sun emphasizes the importance of keeping this setting secure.
- Avoid Sideloading Apps: Download apps exclusively from the Google Play Store. This reduces your risk of malware infections, as outlined by The Sun.
- Enable Google Play Protect: Activate Play Protect to monitor for harmful apps and avoid risky installations. Learn more about Play Protect.
- Regularly Update Your Device: Updates add security patches to your operating system and apps, which can stop spyware. The Scottish Sun covers the importance of timely updates.
- Use Trusted Security Software: For added protection, install a reliable antivirus app. Check out AVG’s spyware removal guide.
Following these precautions will help protect your device from spyware like FakeCall. Staying vigilant and installing only trusted sources are critical steps to secure your Android.