{"id":686072,"date":"2026-04-07T11:26:04","date_gmt":"2026-04-07T11:26:04","guid":{"rendered":"https:\/\/microscopemedia.com\/?p=686072"},"modified":"2026-04-07T11:26:04","modified_gmt":"2026-04-07T11:26:04","slug":"alerta-pe-android-50-de-aplicatii-de-pe-google-play-au-infectat-23-milioane-de-dispozitive-cu-un-virus-care-supravietuieste-resetarii","status":"publish","type":"post","link":"https:\/\/microscopemedia.com\/?p=686072","title":{"rendered":"Alert\u0103 pe Android: 50 de aplica\u021bii de pe Google Play au infectat 2,3 milioane de dispozitive cu un virus care supravie\u021buie\u0219te reset\u0103rii"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/microscopemedia.com\/wp-content\/uploads\/2026\/04\/alerta-pe-android-50-de-aplicatii-de-pe-google-play-au-infectat-23-milioane-de-dispozitive-cu-un-virus-care-supravietuieste-resetarii.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-0\">Opera\u021biunea NoVoice a fost detectat\u0103 de echipa de cercetare mobil\u0103 a McAfee \u0219i reprezint\u0103 una dintre cele mai persistente campanii de malware Android documentate recent. Atacatorii au exploatat vulnerabilit\u0103\u021bi vechi ale sistemului de operare, pentru care fuseser\u0103 lansate patch-uri \u00eentre 2016 \u0219i 2021.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\" id=\"chapter-0\">Cum ajungea virusul pe telefoane<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-1\">Aplica\u021biile infectate se deghizau \u00een utilitare sau jocuri obi\u0219nuite \u0219i erau distribuite prin magazinul oficial Google Play. \u00cen total, cele 50 de aplica\u021bii identificate au acumulat peste 2,3 milioane de desc\u0103rc\u0103ri, conform <a href=\"https:\/\/www.eleconomista.es\/tecnologia\/noticias\/13856785\/04\/26\/alerta-en-android-millones-de-dispositivos-infectados-con-un-virus-que-toma-el-control-de-tu-smartphone.html\" target=\"_blank\" rel=\"noopener\">El Economista<\/a>.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-2\">Odat\u0103 deschis\u0103 aplica\u021bia, aceasta se conecta \u00een fundal la un server extern. De acolo desc\u0103rca exploit-ul adaptat la modelul \u0219i versiunea de software a dispozitivului. Malware-ul suprascria apoi o bibliotec\u0103 central\u0103 a sistemului, ceea ce \u00eei permitea s\u0103 se execute \u00een fiecare aplica\u021bie deschis\u0103 de utilizator.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\" id=\"chapter-1\">De ce este at\u00e2t de periculos<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-3\">Accesul ob\u021binut era complet. Atacatorii puteau extrage date din dispozitiv f\u0103r\u0103 ca utilizatorul s\u0103 observe ceva. Codul mali\u021bios rula invizibil \u00een fundal, integrat \u00een func\u021bionarea normal\u0103 a telefonului.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-4\">Cel mai \u00eengrijor\u0103tor aspect este persisten\u021ba infec\u021biei. Resetarea la set\u0103rile din fabric\u0103 nu elimin\u0103 malware-ul. Singura solu\u021bie este reinstalarea complet\u0103 a firmware-ului \u2013 o opera\u021biune tehnic\u0103 inaccesibil\u0103 majorit\u0103\u021bii utilizatorilor obi\u0219nui\u021bi.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\" id=\"chapter-2\">Cine este cel mai expus<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-5\">Campania a vizat cu prec\u0103dere dispozitivele vechi cu sisteme de operare care nu mai primesc actualiz\u0103ri de securitate. Prevalen\u021ba cea mai mare a fost \u00eenregistrat\u0103 \u00een \u021b\u0103ri precum Etiopia, Algeria, Kenya \u0219i India. Amploarea campaniei a fost \u00eens\u0103 global\u0103.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-6\">Principala m\u0103sur\u0103 de protec\u021bie r\u0103m\u00e2ne actualizarea sistemului de operare. Dispozitivele care nu mai primesc update-uri de securitate sunt vulnerabile la exploit-uri cunoscute de ani de zile.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Opera\u021biunea NoVoice a fost detectat\u0103 de echipa de cercetare mobil\u0103 a McAfee \u0219i reprezint\u0103 una dintre cele mai persistente campanii de malware Android documentate recent. Atacatorii au exploatat vulnerabilit\u0103\u021bi vechi &hellip; <a href=\"https:\/\/microscopemedia.com\/?p=686072\" class=\"more-link\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":686073,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"Default","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/posts\/686072"}],"collection":[{"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=686072"}],"version-history":[{"count":0,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/posts\/686072\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/media\/686073"}],"wp:attachment":[{"href":"https:\/\/microscopemedia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=686072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=686072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=686072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}