Jupyter, One of the Most Dangerous Malware for Your Mobile

It had been a long time since malware had prevented us from falling asleep. Panda Security warns of the existence of a new malicious program that could take us longer than expected, waiting for its opportunity to put everything we store on our smartphone at risk. Our new enemy is called Jupyter .

According to the experts at Panda Security, the company behind one of the best-known computer antivirus in the sector, in recent weeks the Jupyter malware , a virus “that had been hibernating” since this summer, or even earlier, has begun to see the light , in thousands of electronic devices around the world.

In other words, Jupyter enters your mobile, installs itself and falls asleep waiting for the order to arrive to start acting and steal your data.

malware

Jupyter is a virus of Russian origin whose objective is to steal all the information stored in the ‘key rings’ of the computers and mobile phones of its victims: once installed on a computer, the malware accesses all the users and passwords stored in web browsers and, therefore, the cybercriminals who have developed it, can “get hold of all the profiles of a user if they are stored on the infected device ”.

This gives them access to all kinds of social accounts, credit card data, purchase records in all the online stores you’ve been to, your emails, and countless sites where you’ve registered with a user. and a password .

A malware with updates

The most curious thing of all is that, without our being aware of it and as if it were an app like WhatsApp, its creators have been releasing updates to improve it for months. Thus, the malware is able to update itself every time antivirus developers advance in its detection so that it continues to go unnoticed.

Just as dangerous as password theft is the creation of back doors on our computer that the criminal can use to access our mobile, obtain all the information that Jupyter has previously stolen and, incidentally, install new malicious programs with which to mine cryptocurrencies or infect other devices with the same virus.

To avoid problems with these files, Panda Security recommends “having state-of-the-art security measures on our computers that anticipate the technological capacity of cybercriminals” .

Source>Panda Security , Image