Q
Manage Learn to apply best practices and optimize your operations.

Com.google.provision virus: How does it attack Android devices?

The com.google.provision virus reportedly targets Android users, but little is known about it. Nick Lewis discusses the mystery threat and how Common Malware Enumeration may help.

What is the com.google.provision virus? How does it attack Android devices?

It's difficult to look up a virus when its name is unknown. For vulnerabilities, this issue was addressed with Common Vulnerabilities and Exposures, and for malware, it was dealt with using Common Malware Enumeration (CME) identifiers.

Enterprise information security programs would benefit from tracking vulnerabilities or malware across an enterprise; however, this remains difficult as CME development continues.

This problem is evident today with the com.google.provision virus. Several websites reported the virus, but only a few major antimalware vendors did. This could be because other vendors called it by a different name, or because it wasn't deemed a high enough risk to devote resources to a public comment.

Several websites discuss the com.google.provision virus being used to display ads on infected systems, and that it could be an installed application, web browser extension or a malicious JavaScript exploiting insecure functionality in a web browser to display ads.

The attack seems to work like generic adware in the sense that, when visiting a malicious website, the website opens a new window that displays ads, and then asks the user to install a browser extension, to install applications to view the webpage or even to clean up a problem, such as fake antivirus software scams.

Ask the expert:
Have a question about enterprise threats? Send it via email today. (All questions are anonymous.)

This was last published in March 2018

Dig Deeper on Mobile security threats and prevention

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

How can the Common Malware Enumeration system better identify lesser-known malware?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close