After the massive data breach, the result of hacking Hacking Team, continue to meet techniques and methods to infect devices, but this time it comes to mobile phones with Android and iOS.

Both operating systems were vulnerable to an RCS (Remote Control System) malware that allows attackers to install an application to get sensitive information, according to information from Help Net Security.

In iOS they could be made of the contact information, the location and timing, while Android could make catches, monitor the clipboard, capture passwords, use the phone microphone, get SMS and MMS, Gmail email messages, applications MI The location information of the mobile, take pictures with the rear and front cameras and listening conventional phone or VoIP conversations.

The iOS version of the malware was installed as a ‘paper’ application in the Apple Newsstand and showed an invisible and nameless icon. Previously it was believed that only jailbreak devices were vulnerable, until it was discovered that Hacking Team used a certificate from Apple to install malware on iOS devices without jailbreak.

Meanwhile, the RCS Android malware was distributed via a false application hosted in the Play Store or to access a specific URL, the root being the most vulnerable users. This was installed with the necessary permits, either from the application or by accessing the URL that works as an activator of exploits, by exploiting vulnerabilities in browsers on Android, version 4.0 (ICS) to 4.3 (Jelly Bean).

The only recommendations to prevent or get rid of the malware infection is to avoid installing applications from non-legitimate means, read the application permissions cautiously upgrading the operating, or if you have been infected system completely reset the operating system .