Detect Date | 06/09/2017 | |||||||||||||||||||||||||||||||||
Class | HackTool | |||||||||||||||||||||||||||||||||
Platform | AndroidOS | |||||||||||||||||||||||||||||||||
Description |
This malware can disconnect other users from a Wi-Fi network. It sends a large number of packets to a router, making it look as if the packets were sent by the victim. As a result, traffic from the victim is blocked. Traffic modification functionality is contained in an ELF file. ARP spoofing and the iptable class=”most_attacked_countries”. Geographical distribution of attacks by the HackTool.AndroidOS.Wifikill family
Top 10 countries with most attacked users (% of total attacks)
* Percentage among all unique Kaspersky users worldwide attacked by this malware |
|||||||||||||||||||||||||||||||||
Find out the statistics of the threats spreading in your region |