(pc-Google Images) |
The trojan enters the mobile through apps such as BatteryLife, without affecting the functioning of the mobile phone. The trojan secretly loads malicious code onto the device.
After the codes being loaded, the trojan gets activated and begins opening web pages using the Wireless Application Protocol (WAP) billing – a form of mobile payment – which adds cost directly to the phone user’s post-paid bill. The process also does not require user to register a debit or credit card or set up a username and password. The malware uses technology to bypass 'captcha' systems designed to protect users by confirming the action is being performed by a human.
Xafecopy hit more than 4,800 users in 47 countries within the space of a month, with 37.5 per cent of the attacks detected and blocked by Kaspersky Lab products targeting India, followed by Russia, Turkey and Mexico.