<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2020-5-1-0-4</article-id><article-id pub-id-type="publisher-id">1984</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>OVERVIEW OF REMOTE ACCESS VIRUSES FOR MOBILE DEVICES</article-title><trans-title-group xml:lang="en"><trans-title>OVERVIEW OF REMOTE ACCESS VIRUSES FOR MOBILE DEVICES</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kakaev</surname><given-names>Denis Valerievich</given-names></name><name xml:lang="en"><surname>Kakaev</surname><given-names>Denis Valerievich</given-names></name></name-alternatives><email>619deniss61999@gmail.com</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>info@sevsu.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2020</year></pub-date><volume>5</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2020/1/ИТ_4.pdf" /><abstract xml:lang="ru"><p>The current level of prevalence of mobile devices makes them available to everyone. Many important files are stored on smartphones and financial transactions and authorization operations are performed using smartphones. In this regard, the number of scammers who want to get the data stored on the phone has increased. But the protection of mobile devices does not allow you to be calm about the security of information. Creating malicious software is not difficult and can be done by any enthusiast. To do this, you do not need to have programming skills, understand operating system vulnerabilities, or have some hard-to-access software. It is enough to use one of the many programs that are in the public domain and available to everyone. The article discusses options for the distribution of remote access viruses on the example of the Android operating system, as the most popular, the algorithm for creating a simple virus using the program AhMyth, and some recommendations for protecting your device.</p></abstract><trans-abstract xml:lang="en"><p>The current level of prevalence of mobile devices makes them available to everyone. Many important files are stored on smartphones and financial transactions and authorization operations are performed using smartphones. In this regard, the number of scammers who want to get the data stored on the phone has increased. But the protection of mobile devices does not allow you to be calm about the security of information. Creating malicious software is not difficult and can be done by any enthusiast. To do this, you do not need to have programming skills, understand operating system vulnerabilities, or have some hard-to-access software. It is enough to use one of the many programs that are in the public domain and available to everyone. The article discusses options for the distribution of remote access viruses on the example of the Android operating system, as the most popular, the algorithm for creating a simple virus using the program AhMyth, and some recommendations for protecting your device.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>remote access Virus</kwd><kwd>RAT</kwd><kwd>Remote Access Trojan</kwd><kwd>Android</kwd><kwd>AhMyth</kwd><kwd>security</kwd><kwd>vulnerability</kwd></kwd-group><kwd-group xml:lang="en"><kwd>remote access Virus</kwd><kwd>RAT</kwd><kwd>Remote Access Trojan</kwd><kwd>Android</kwd><kwd>AhMyth</kwd><kwd>security</kwd><kwd>vulnerability</kwd></kwd-group></article-meta></front><back /></article>