{"id":22269,"date":"2016-02-17T21:47:56","date_gmt":"2016-02-18T05:47:56","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2016\/02\/mazar-bot-can-erase-android-phones"},"modified":"2017-06-04T10:54:07","modified_gmt":"2017-06-04T17:54:07","slug":"mazar-bot-can-erase-android-phones","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2016\/02\/mazar-bot-can-erase-android-phones","title":{"rendered":"Mazar BOT Can Erase Android Phones"},"content":{"rendered":"<p><a class=\"blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/mazar-bot-can-erase-android-phones.png\"><\/a><\/p>\n<p>Lookout for MAZAR Bot \u2014 Androids should be scared.<\/p>\n<hr>\n<p>One interesting feature of <a href=\"https:\/\/heimdalsecurity.com\/blog\/security-alert-mazar-bot-active-attacks-android-malware\/\">Mazar<\/a> is that it can not be installed on smartphones running <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.ndtv.gadgets\" target=\"_blank\">Android<\/a> with \u201cRussian\u201d selected as the operating system\u2019s language.<\/p>\n<p>The malware allows the attackers to spy on nearly every activity capable on an Android device, including establishing a backdoor connection, sending premium SMS messages, reading texts sent to the device, including bank authentication PINs.<\/p>\n<p><strong>Turn off \u201cUnknown Sources\u201d on your device<\/strong> \u2014 The best way to avoid downloading malicious items is to not allow <strong>unknown sources<\/strong> to install stuff on your device. The app asks for wide ranging permissions, including the ability to send SMS, have full internet access, and the ability to erase a phone.<\/p>\n<p><a href=\"http:\/\/sacredheartspectrum.com\/2016\/02\/mazar-bot-can-erase-android-phones\/\" target=\"_blank\">Read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lookout for MAZAR Bot \u2014 Androids should be scared. One interesting feature of Mazar is that it can not be installed on smartphones running Android with \u201cRussian\u201d selected as the operating system\u2019s language. The malware allows the attackers to spy on nearly every activity capable on an Android device, including establishing a backdoor connection, sending [\u2026]<\/p>\n","protected":false},"author":395,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,418,1512,6,1492],"tags":[],"class_list":["post-22269","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-internet","category-mobile-phones","category-robotics-ai","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/22269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/395"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=22269"}],"version-history":[{"count":2,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/22269\/revisions"}],"predecessor-version":[{"id":62824,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/22269\/revisions\/62824"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=22269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=22269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=22269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}