Gigaset Android Phones

10th April 2021, Kathmandu

Gigaset, a German multinational company well known in the area of communication revealed to have a malware infection in their android phones. Owners of Gigaset android phones have been repeatedly infected with malware since the end of March.

Around March 27th, users suddenly found their Gigaset mobile devices repeatedly opening web browsers and displaying advertisements for mobile game sites. While inspecting, users found an unknown app called “easenf” which on deletion would automatically be reinstalled.

According to the German tech site BornCity, the easenf app was installed by the device’s system update app. Other malicious apps found alongside it include ‘gem’, ‘smart’, and ‘xiaoan.’

The malware took the form of multiple unwanted apps that were downloaded and installed through a pre-installed system update app also impacting older smartphones model series.

The German manufacturer of telecommunications devices said it took steps to alert the update service provider of the issue, following which further infections were prevented on April 7.

STAY AHEAD OF CYVERATTACKS WITH VIRTUAL CYBERSECURITY

With cyber threats constantly evolving and becoming more sophisticated, chief information security officers (CISOs) and cybersecurity teams need to be able to react swiftly to protect their institutions against cyber threats while maintaining business continuity. Companies can ill-afford issues like data breaches, network outages, and malicious attacks compromising data integrity, that will impact their bottom line, reputation, and their customers.

Virtual cybersecurity indicates threats that traditional security cannot detect.  With more business activities and operations taking place digitally, cybersecurity has become a natural, perhaps even urgent, consideration as companies become more vulnerable to cyber threats and attacks.

Virtual security operations eliminate the need to have an in-house security team, but they still provide you with access to cybersecurity specialists when you need them. When you have virtual cybersecurity, you enjoy a centralized console and synchronized management of your networks, devices, and applications.

LEAVE A REPLY

Please enter your comment!
Please enter your name here