XHelper Trojan continues to infect thousands of devices ... and almost impossible to remove them
XHelper Trojan continues to infect thousands of devices ... and almost impossible to remove them

Last year, dangerous malware was discovered that attacked Android devices. The program is infamous xHelper Trojan. It is almost impossible to remove a Trojan horse from an infected device. By March last year, more than 55,000 cell phones had been infected worldwide and the attack continues.

After installation, Trojan xHelper begins a series of downloads of other malicious files, including a file called Triada, which allows access to the root directory of the operating system on the infected phone, which makes it very difficult to remove. xHelper because the system has been reinstalled. Malware installed in the folder Additionally, the deleted app classifies all files copied by malware in the phone folder as unchangeable. This means that users, even knowledgeable users, cannot delete this.

Kaspersky Malware Analyst (Igor Golovin) has pointed out the dangers of xHelper Trojan: he created a back port through which attackers could execute commands like smart users and access all data. The app added: "Then you can use other malware (example: use CookieThief) to use similar backend ports to attack the device itself, and since it is almost impossible to remove xHelper, users from," Android needs to be careful to understand what is being downloaded to the phone. Use content and security software Always strong for mobile devices, and given opportunities to download apps from officially approved stores, the malicious code for the app fails a lot. "

Kaspersky experts recommend the following steps to protect yourself from xHelper Trojan and other malware for Android devices:





Save 80.0% on select products from RUWQ with promo code 80YVSNZJ, through 10/29 while supplies last.

HP 2023 15'' HD IPS Laptop, Windows 11, Intel Pentium 4-Core Processor Up to 2.70GHz, 8GB RAM, 128GB SSD, HDMI, Super-Fast 6th Gen WiFi, Dale Red (Renewed)
Previous Post Next Post