'Agent Smith' Malware Effects Millions Of Android Phones

Agent Smith Android malware has infected 25 million devices so far

Agent Smith Android malware has infected 25 million devices so far

A new strain of malware quietly has infected an estimated 25 million outdated Android devices.

After getting all the necessary permissions that users have provided real world applications, "Agent Smith" was able to grab other apps to display unwanted ads to the owner of the gadget.

If you have been affected by the Agent Smith Android threat then here's how you can remove any nefarious apps on Android, according to Check Point...

To avoid detection, the malware - under its disguise as popular apps like WhatsApp or Flipkart - is also capable of replacing code in the original program with its own malicious version that prevents an app from being updated.

According to the reports of Daily Mail, more than 15 million devices are affected in the United States and in India it has just doubled its numbers to 30 million.

After all this Android user gets no clue about this malicious factor.

Jonathan Shimonovich of Checkpoint said that attacks user-installed applications and makes it nearly impossible for users to combat it on their own.

They said: "In the Wachowskis" classic Matrix trilogy, "Agent Smith' famously describes the human race as a species that multiplies until every resource is consumed".

Many users were unaware that they had been infected.

This malware was detected by Check Point research and after working with the Google to find out infected applications; Google have removed 16 apps from its Play Store.

The malware is named after a fictional villain in the 1999 movie "The Matrix" who was able to turn victims into copies of himself.

The team from Check Point Research also reported that they have connected "Agent Smith" to an internet company in Guangzhou, China, whose business is to help Chinese Android developers promote their apps overseas.

The malware's operator also appears to have attempted to make available the malicious app on the Google Play Store itself where it managed to sneak 11 apps that featured code related to a watered-down version of the malware.

A stack of dodgy apps have been identified in the Google Play Store. This Android malware worked taking advantage of a critical Android vulnerability that was technically patched by Google years ago. If any targeted application is found, Agent Smith will then attack those innocent applications at a later stage.

He added that "users should only be downloading apps from trusted app stores to mitigate the risk of infection as third-party app stores often lack the security measures required to block adware loaded apps".