Technology

9 Million Android Devices Hijacked in Secret Proxy Network

Google recently made headlines by shutting down what they deemed as the world’s largest residential proxy network. This network, believed to be operated by Chinese company IPIDEA, reportedly hijacked around nine million Android devices, as well as computers and smart home products. The discovery was first brought to light by our affiliate publication PC-Welt.

The hijacking of these devices was facilitated through hidden code libraries, known as SDKs, which were embedded within over 600 free apps and programs. Once installed, these apps allowed cybercriminals to utilize the user’s device as an exit node in a proxy network without their knowledge.

This exploitation enabled bad actors to conceal their identities, redirect traffic, and launch denial-of-service (DoS) attacks, all while remaining undetected by the device owners.

With the backing of a federal court ruling in the U.S., Google took swift action to dismantle IPIDEA’s websites and underlying systems, effectively putting an end to further misuse. The tech giant emphasized the importance of avoiding third-party app stores, highlighting the security features of Google’s Play Protect as a crucial defense against such threats.

While IPIDEA claims that their service was intended for legitimate purposes, they acknowledge that criminal elements have taken advantage of the network.

To safeguard yourself and your devices from similar threats, consider the following precautions:

– Exercise caution with apps that offer payment in exchange for sharing unused bandwidth or internet access.
– Only download apps from official and reputable app stores.
– Review the permissions requested by apps, VPNs, and proxies before installation.
– Utilize Google Play Protect to scan and vet your apps for hidden risks.
– Purchase smart home devices and set-top boxes from trustworthy manufacturers.

By staying vigilant and adhering to these security measures, you can better protect yourself from falling victim to malicious schemes. Remember, it’s essential to prioritize security and only engage with trusted sources when it comes to accessing and downloading apps and services.

This article was originally published on our affiliate site PC för Alla and has been translated and adapted from Swedish for our readers.

Related Articles

Back to top button