McAfee security experts claim that nearly 80% of the clones Flappy Bird contained malware. The clones of the game phenomenon affecting not only Android but also and especially the iPhone undergo jailbreak. Far from extinction phenomenon Flappy Bird is intended not only to stay but to grow dramatically: after the meteoric success and rapid removal from the App Store in the original Flappy Bird, app stores for all brands and all species are being invaded by a multitude of clones.
Now, security experts warn McAfee: Nearly 80% of the clones Flappy Bird in circulation contains malware.
The news comes as a surprise but not surprising: always the creators of viruses and malware propagation systems process the best to hit as many users as possible. Considering the overall success of Flappy Bird in the choice of integrating malware clones is particularly guessed it: the many users who have not had time to download the original have rushed to download and install a clone, just to see for yourself what consisted of the phenomenon of the moment.
Again, as always happens in the case of malware for mobile platforms, users and devices are the ones most affected Android is open source and the absence of controls allow developers to publish apps more freely, integrated malware included. Things are better for iPhone users, but only for those who are not subjected to jailbreak your Apple smartphone. McAfee warns: jailbreak you can install and run unauthorized third-party app on the iPhone, so the risk of infection increases exponentially.
Smartphones targeted by malware clones Flappy Bird may be subject to various types of attacks: in some cases are made phone calls to toll numbers very expensive, or send any messages to send money, in both cases without permission. In other cases, they are stolen the zip codes of the users, information to create the most effective fraud on credit cards: purchases made with stolen credit card numbers are identified thanks to you safety systems that take into account the geographical distance between the location of the operation and that of residence.
If the pirates are able to obtain credit card numbers, close to the area of use, it is more difficult to track them and block them, so the postal code information becomes a well paid on the black market.