CopyCat malware infects 14 million Android devices

CopyCat malware is a fast spreading strain of Android malware that has infected more than 14 million devices to date. The malware creators have already raked in more than $1.5 million (€1.3 million) in two months.

CopyCat malware generates and steals ad revenues by rooting itself into compromised Android devices. The malware launches apps in the Android operating system, allowing cyber criminals to fraudulently install apps and substitute their referral ID with the owner’s real one, which then allows the cyber criminals to receive revenues by taking credit for the installation of said apps.

The malware has spread globally: 55% of infected devices were in Asia, with India being the worst hit region with more than 3.8 million infected devices. Pakistan, Bangladesh and Indonesia all had more than 1 million infected devices each. 18% of infected devices were in Africa, the Americas had 12% and Oceania had 8%. The least infected area was Europe, with only 7% of infected devices being found here.


Protect yourself from attacks

In response to the growing concern over ransomware and malware, IT Governance now provides a scalable solution for staff awareness training. Our Phishing and Ransomware – Human patch e-learning course explains the threats that ransomware presents to organisations, and gives details of the resources available to help you understand and combat those threats. This ten-minute course provides an introduction to phishing and ransomware. We also offer a more detailed Phishing Staff Awareness Course.

We also offer a three-day Cyber Health Check for large organisations. This includes on-site consultancy and audit, remote vulnerability assessments and an online staff survey in order to assess your cyber risk exposure and identify a practical route to minimise your risks. Receive a prioritised action plan for controlling your cyber risks in line with your risk appetite.

Visit our ransomware page to view all the services we offer to help your organisation combat threats.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.