{"id":328,"date":"2022-07-03T14:26:10","date_gmt":"2022-07-03T14:26:10","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=328"},"modified":"2022-07-03T14:26:10","modified_gmt":"2022-07-03T14:26:10","slug":"a-microsoft-figyelmezteti-az-androidos-telefonok-felhasznaloit-a-fejlodo-dijcsalo-malware-alkalmazasokra","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/hirek\/a-microsoft-figyelmezteti-az-androidos-telefonok-felhasznaloit-a-fejlodo-dijcsalo-malware-alkalmazasokra\/","title":{"rendered":"A Microsoft figyelmezteti az Android telefonok felhaszn\u00e1l\u00f3it a fejl\u0151d\u0151 d\u00edjcsal\u00e1sos rosszindulat\u00fa alkalmaz\u00e1sokra"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Ha \u00d6n Android telefon haszn\u00e1l\u00f3, a Microsoft figyelmezteti: figyeljen a d\u00edjcsal\u00f3 rosszindulat\u00fa alkalmaz\u00e1sokra. Ezek az alkalmaz\u00e1sok egyre \u00f6sszetettebb\u00e9 \u00e9s nehezebben \u00e9szlelhet\u0151v\u00e9 v\u00e1ltak, c\u00e9ljuk, hogy p\u00e9nzt lopjanak el \u00d6nt\u0151l rejtett el\u0151fizet\u00e9si d\u00edjak felsz\u00e1m\u00edt\u00e1s\u00e1val. A Microsoft egy blogbejegyz\u00e9sben v\u00e1zolta fel ennek a rosszindulat\u00fa t\u00e1mad\u00e1snak a l\u00e9p\u00e9seit, hogy tiszt\u00e1ban legyen a vesz\u00e9lyekkel \u00e9s megv\u00e9dhesse mag\u00e1t.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A d\u00edjcsal\u00e1s, m\u00e1s n\u00e9ven \u201cfreemium v\u00edrus\u201d vagy \u201ccsapdaware\u201d, egy sz\u00e1ml\u00e1z\u00e1si csal\u00e1s, amelyben gyan\u00fatlan embereket cs\u00e1b\u00edtanak arra, hogy pr\u00e9mium tartalom\u00e9rt fizessenek an\u00e9lk\u00fcl, hogy tudn\u00e1nak r\u00f3la vagy beleegyezn\u00e9nek. Ez k\u00fcl\u00f6nb\u00f6zik m\u00e1s fleeceware vesz\u00e9lyekt\u0151l, mivel a k\u00e1ros funkci\u00f3k csak akkor aktiv\u00e1l\u00f3dnak, amikor egy hacker \u00f6sszekapcsol egy eszk\u00f6zt az egyik c\u00e9lh\u00e1l\u00f3zati oper\u00e1tor\u00e1val.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Tov\u00e1bb\u00e1, a\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/06\/30\/toll-fraud-malware-how-an-android-application-can-drain-your-wallet\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Valsamaras \u00e9s Shin Jung<\/span><\/a><span data-preserver-spaces=\"true\">\u00a0a Microsoft 365 Defender Kutat\u00f3csoportj\u00e1b\u00f3l felfedezt\u00e9k, hogy alap\u00e9rtelmez\u00e9s szerint a mobilh\u00e1l\u00f3zathoz csatlakozik tev\u00e9kenys\u00e9gekhez, m\u00e9g akkor is, ha Wi-Fi kapcsolat el\u00e9rhet\u0151. \u201cAlap\u00e9rtelmez\u00e9s szerint \u00edgy tesz\u201d \u2013 \u00e1ll\u00edtott\u00e1k.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Ezt k\u00f6vet\u0151en l\u00e9trehoz egy hamis el\u0151fizet\u00e9st, \u00e9s \u00fajra meger\u0151s\u00edti azt, miut\u00e1n kapcsolatot l\u00e9tes\u00edtett egy adott h\u00e1l\u00f3zattal.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A Magento platform leg\u00fajabb verzi\u00f3ja k\u00fcl\u00f6nf\u00e9le harmadik f\u00e9lt\u0151l sz\u00e1rmaz\u00f3 \u00e9s saj\u00e1t biztons\u00e1gi megold\u00e1sokat haszn\u00e1l az online csal\u00e1sok elleni v\u00e9delem \u00e9rdek\u00e9ben, t\u00f6bb m\u00f3dszert alkalmazva, bele\u00e9rtve:<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A d\u00edjcsal\u00e1s akkor fordul el\u0151, amikor a fogyaszt\u00f3k egy WAP-k\u00e9pes weboldal \u00e1ltal ny\u00fajtott legitim fizet\u0151s szolg\u00e1ltat\u00e1st haszn\u00e1lnak, hogy olyan term\u00e9keket vagy szolg\u00e1ltat\u00e1sokat szerezzenek be, amelyeket az elad\u00f3 nem enged\u00e9lyez. Az \u00fcgyfelek mobiltelefon sz\u00e1ml\u00e1it automatikusan megterhelik, ahelyett, hogy hitel- vagy bankk\u00e1rty\u00e1t kellene l\u00e9trehozniuk, vagy felhaszn\u00e1l\u00f3nevet \u00e9s jelsz\u00f3t kellene megadniuk.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2017_mobile-trojans-revert-to-old-techniques-and-steal-users-money-through-wap-billing-services\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Kaspersky<\/span><\/a><span data-preserver-spaces=\"true\">, a hackerek meg tudj\u00e1k hat\u00e1rozni egy WAP sz\u00e1ml\u00e1z\u00e1si tr\u00f3jai IP-c\u00edm\u00e9t, ha a felhaszn\u00e1l\u00f3 mobiladatokkal csatlakozik az internethez. \u201cA felhaszn\u00e1l\u00f3kat csak akkor terhelik meg, ha helyesen azonos\u00edtj\u00e1k \u0151ket, ami k\u00f6nnyen megt\u00f6rt\u00e9nik\u201d \u2013 \u00e1ll\u00edtja a Kaspersky 2017-es tanulm\u00e1nya a WAP sz\u00e1ml\u00e1z\u00e1si tr\u00f3jaiakr\u00f3l.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">N\u00e9h\u00e1ny v\u00e1llalat k\u00e9rhet OTP-k\u00f3dokat a szolg\u00e1ltat\u00e1s bekapcsol\u00e1sa el\u0151tt, mint m\u00e1sodik szint\u0171 ellen\u0151rz\u00e9st.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A rosszindulat\u00fa program a felhaszn\u00e1l\u00f3 nev\u00e9ben l\u00e1tsz\u00f3lag val\u00f3di m\u00f3don futtatja az el\u0151fizet\u00e9st. A rosszindulat\u00fa program egy [ir\u00e1ny\u00edt\u00f3 \u00e9s vez\u00e9rl\u0151] szerverrel kommunik\u00e1l, hogy megszerezze az el\u00e9rhet\u0151 szolg\u00e1ltat\u00e1sok list\u00e1j\u00e1t.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A rosszindulat\u00fa program t\u00f6bb f\u00e1jlt t\u00f6lt le a kompromitt\u00e1lt weboldalr\u00f3l, bele\u00e9rtve az AdNab.exe \u00e9s a rundll32.exe f\u00e1jlokat. Ezut\u00e1n JavaScriptet haszn\u00e1l arra, hogy titokban el\u0151fizessen a szolg\u00e1ltat\u00e1sra, \u00e9s fogadja \u00e9s k\u00fcldje az OTP-k\u00f3dot (ha sz\u00fcks\u00e9ges). A programoz\u00f3k \u00fagy tervezt\u00e9k a JavaScript k\u00f3dot, hogy programozott megk\u00f6zel\u00edt\u00e9st alkalmazzon az el\u0151fizet\u00e9s elind\u00edt\u00e1s\u00e1hoz, HTML elemeket vez\u00e9relve, amelyek kulcsszavakat tartalmaznak, mint p\u00e9ld\u00e1ul \u201cmeger\u0151s\u00edt\u201d, \u201ckattint\u00e1s\u201d vagy \u201cfolytat\u00e1s\u201d.\u201d<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A rosszindulat\u00fa program t\u00f6r\u00f6lheti a bej\u00f6v\u0151 sz\u00f6veges \u00fczeneteket, amelyek a feliratkozott szolg\u00e1ltat\u00e1sr\u00f3l sz\u00f3l\u00f3 inform\u00e1ci\u00f3kat tartalmaznak a mobilh\u00e1l\u00f3zati oper\u00e1tort\u00f3l, ha egy csal\u00f3 el\u0151fizet\u00e9s sikeres.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Az Android dinamikus k\u00f3d bet\u00f6lt\u00e9si k\u00e9pess\u00e9ge, amely lehet\u0151v\u00e9 teszi az alkalmaz\u00e1sok sz\u00e1m\u00e1ra, hogy tov\u00e1bbi modulokat t\u00f6ltsenek le egy t\u00e1voli szerverr\u0151l fut\u00e1sid\u0151ben, megk\u00f6nny\u00edti a gyan\u00fas egy\u00e9nek sz\u00e1m\u00e1ra a rendszer kihaszn\u00e1l\u00e1s\u00e1t.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A rosszindulat\u00fa program \u00edr\u00f3i olyan alkalmaz\u00e1st hozhatnak l\u00e9tre, amely rossz viselked\u00e9st mutat. De a rossz viselked\u00e9s csak akkor fordul el\u0151, ha meghat\u00e1rozott k\u00f6r\u00fclm\u00e9nyek teljes\u00fclnek. Ez\u00e9rt neh\u00e9z lesz megtal\u00e1lni ezt a rossz viselked\u00e9st statikus k\u00f3d elemz\u00e9si ellen\u0151rz\u00e9sekkel a biztons\u00e1gi oldalon.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A h\u00e1ts\u00f3 ajt\u00f3s rosszindulat\u00fa program egy alkalmaz\u00e1son kereszt\u00fcl telep\u00edtett rosszindulat\u00fa szoftver, amely dinamikusan gener\u00e1lt k\u00f3dot hoz l\u00e9tre sz\u00f6veges \u00fczenetek megragad\u00e1s\u00e1ra, ahogyan azt a\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/developers.google.com\/android\/play-protect\/potentially-harmful-applications\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Google fejleszt\u0151i dokument\u00e1ci\u00f3ja<\/span><\/a><span data-preserver-spaces=\"true\">\u00a0a potenci\u00e1lisan k\u00e1ros alkalmaz\u00e1sok (PHA-k) sz\u00e1m\u00e1ra.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A d\u00edjak j\u00f6vedelmez\u0151 \u00fczlett\u00e9 v\u00e1ltak a hackerek sz\u00e1m\u00e1ra, a csal\u00f3 alkalmaz\u00e1sok az Android alkalmaz\u00e1s piacon az \u00f6sszes PHA 34,8 sz\u00e1zal\u00e9k\u00e1t tett\u00e9k ki 2022 els\u0151 h\u00e1rom h\u00f3napj\u00e1ban, k\u00f6zvetlen\u00fcl a k\u00e9mprogramok alatt a m\u00e1sodik helyen. A legt\u00f6bb telep\u00edt\u00e9st Indi\u00e1ban, Oroszorsz\u00e1gban, Mexik\u00f3ban, Indon\u00e9zi\u00e1ban \u00e9s T\u00f6r\u00f6korsz\u00e1gban figyelt\u00e9k meg.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Ha el akarja ker\u00fclni, hogy d\u00edjcsal\u00f3 rosszindulat\u00fa program \u00e1ldozat\u00e1v\u00e1 v\u00e1ljon, k\u00f6vesse a blogcikkben v\u00e1zolt utas\u00edt\u00e1sokat. A felhaszn\u00e1l\u00f3knak csak a Google Play \u00c1ruh\u00e1zb\u00f3l vagy m\u00e1s legitim forr\u00e1sokb\u00f3l kell alkalmaz\u00e1sokat beszerezni\u00fck. Korl\u00e1tozniuk kell az alkalmaz\u00e1sok jogosults\u00e1gait, \u00e9s fontol\u00f3ra kell venni\u00fck a telefon cser\u00e9j\u00e9t, ha az nem kap friss\u00edt\u00e9seket.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Ha Android telefon felhaszn\u00e1l\u00f3 vagy, a Microsoft figyelmeztet: figyelj a d\u00edjcsal\u00e1sos rosszindulat\u00fa alkalmaz\u00e1sokra. Ezek az alkalmaz\u00e1sok egyre \u00f6sszetettebb\u00e9 \u00e9s nehezebben \u00e9szlelhet\u0151v\u00e9 v\u00e1ltak, c\u00e9ljuk a lop\u00e1s\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/hirek\/a-microsoft-figyelmezteti-az-androidos-telefonok-felhasznaloit-a-fejlodo-dijcsalo-malware-alkalmazasokra\/\">Folytat\u00e1s <span class=\"screen-reader-text\">A Microsoft figyelmezteti az Android telefonok felhaszn\u00e1l\u00f3it a fejl\u0151d\u0151 d\u00edjcsal\u00e1sos rosszindulat\u00fa alkalmaz\u00e1sokra<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":329,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-328","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps | Security Briefing<\/title>\n<meta name=\"description\" content=\"Watch out for toll fraud malware apps. These apps have become more complex and harder to detect, intending to steal your money by charging you hidden subscription fees.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/hirek\/a-microsoft-figyelmezteti-az-androidos-telefonok-felhasznaloit-a-fejlodo-dijcsalo-malware-alkalmazasokra\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Watch out for toll fraud malware apps. These apps have become more complex and harder to detect, intending to steal your money by charging you hidden subscription fees.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/hirek\/a-microsoft-figyelmezteti-az-androidos-telefonok-felhasznaloit-a-fejlodo-dijcsalo-malware-alkalmazasokra\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-03T14:26:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"565\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps\",\"datePublished\":\"2022-07-03T14:26:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/\"},\"wordCount\":644,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/\",\"name\":\"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg\",\"datePublished\":\"2022-07-03T14:26:10+00:00\",\"description\":\"Watch out for toll fraud malware apps. These apps have become more complex and harder to detect, intending to steal your money by charging you hidden subscription fees.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg\",\"width\":850,\"height\":565,\"caption\":\"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Microsoft figyelmezteti az Android telefonok felhaszn\u00e1l\u00f3it a fejl\u0151d\u0151 d\u00edjcsal\u00f3 k\u00e1rtev\u0151 alkalmaz\u00e1sokra | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Figyelj a d\u00edjcsal\u00e1sra specializ\u00e1l\u00f3dott rosszindulat\u00fa alkalmaz\u00e1sokra. Ezek az alkalmaz\u00e1sok egyre \u00f6sszetettebb\u00e9 v\u00e1ltak \u00e9s nehezebben \u00e9szlelhet\u0151k, c\u00e9ljuk pedig az, hogy p\u00e9nzt lopjanak el t\u0151led rejtett el\u0151fizet\u00e9si d\u00edjak felsz\u00e1m\u00edt\u00e1s\u00e1val.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/hirek\/a-microsoft-figyelmezteti-az-androidos-telefonok-felhasznaloit-a-fejlodo-dijcsalo-malware-alkalmazasokra\/","og_locale":"hu_HU","og_type":"article","og_title":"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps | Security Briefing","og_description":"Watch out for toll fraud malware apps. These apps have become more complex and harder to detect, intending to steal your money by charging you hidden subscription fees.","og_url":"https:\/\/securitybriefing.net\/hu\/hirek\/a-microsoft-figyelmezteti-az-androidos-telefonok-felhasznaloit-a-fejlodo-dijcsalo-malware-alkalmazasokra\/","og_site_name":"Security Briefing","article_published_time":"2022-07-03T14:26:10+00:00","og_image":[{"width":850,"height":565,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"security","Becs\u00fclt olvas\u00e1si id\u0151":"3 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps","datePublished":"2022-07-03T14:26:10+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/"},"wordCount":644,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg","articleSection":["News"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/","url":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/","name":"A Microsoft figyelmezteti az Android telefonok felhaszn\u00e1l\u00f3it a fejl\u0151d\u0151 d\u00edjcsal\u00f3 k\u00e1rtev\u0151 alkalmaz\u00e1sokra | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg","datePublished":"2022-07-03T14:26:10+00:00","description":"Figyelj a d\u00edjcsal\u00e1sra specializ\u00e1l\u00f3dott rosszindulat\u00fa alkalmaz\u00e1sokra. Ezek az alkalmaz\u00e1sok egyre \u00f6sszetettebb\u00e9 v\u00e1ltak \u00e9s nehezebben \u00e9szlelhet\u0151k, c\u00e9ljuk pedig az, hogy p\u00e9nzt lopjanak el t\u0151led rejtett el\u0151fizet\u00e9si d\u00edjak felsz\u00e1m\u00edt\u00e1s\u00e1val.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg","width":850,"height":565,"caption":"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"biztons\u00e1g","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin a Government Technology vezet\u0151 munkat\u00e1rsa. Kor\u00e1bban a PYMNTS \u00e9s a The Bay State Banner sz\u00e1m\u00e1ra \u00edrt, \u00e9s a Carnegie Mellon Egyetemen szerzett B.A. diplom\u00e1t kreat\u00edv \u00edr\u00e1sb\u00f3l. Boston k\u00f6rny\u00e9k\u00e9n \u00e9l.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/hu\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=328"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/328\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/329"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}