Sunday, September 8, 2013

Trojan for Android is disseminated via botnet - Administrators

Writing, www.administradores.com, September 8, 2013

Android has established itself as a favorite target of cybercriminals among all mobile operating systems and can be considered as the equivalent to Windows in the world of mobile devices. Among several reported attacks against the platform in the first half is a new version of one of the most sophisticated Trojans for Android, which was found being disseminated through botnets.

Almost all samples furniture discovered in a mobile environment in the second quarter of 2013 point to the Android, as happened in the first quarter of this year. Discovered two of these malicious programs are very dangerous, and Obad Update Free Calls, which are able to infect the phone and trick the user.

According to analysts from Kaspersky Lab malware detected as “Backdoor. AndroidOS.Obad.a “is probably the most sophisticated Trojan of all time directed to the Android platform. It can send SMS messages to premium rate numbers, download and install other malware on the infected device and / or infections send via Bluetooth as well as run remote commands from the device.

The Obad. mark the first time in the history of mobile crime where a Trojan is spread using botnets controlled by criminal groups. The malicious file can only be installed if the user opens it. If this happens the Trojan sends more malicious messages to all contacts of newly infect ed devices. Clicking the link of these messages the user downloads the Obad.a.

In addition to using mobile botnets and spam messages to disseminate this complex malware also relies on application stores fake who copy content of the pages Google Play, by replacing legitimate malicious links.

“In three months we found 12 versions Backdoor.AndroidOS.Obad.a. All had the same set of functions and a high level of obfuscation code, and each used a vulnerability in Android to give administrator rights on the device for malware, making it much more difficult to eliminate this threat. soon as we discover it, we inform Google and the gap has closed in Android 4.3. However just some new smartphones and tablets running this version, and older devices running previous versions are still under threat. Obad.a The, which uses a large number of unpublished vulnerabilities, is more like malware than Windows the other Trojan for Android, “explained Roman Unuchek, leading experts in antivirus Kaspersky Lab

The other malicious program that infects Android mobile devices is the application” Free Calls Update “, a mixture of fake antivirus and ransomware. The application, once executed, attempts to obtain administrator privileges to modify the device settings and so on / off Wi-Fi and 3G. The application is a fake antivirus malware that pretends to analyze and detect alleged pests on your device, encouraging the victim to purchase a license for the full version, as in PCs

When browsing, the application displays a window pop-up that manages to scare the user and warns that a malicious program tries to steal pornographic cell phone, this warning is repetitive and completely blocks the device.

According to statistics from Kaspersky Lab, in the second quarter of 2013 there was a steady increase in malware for Android compared to the first quarter, with a total of 29,695 changes (first quarter 2013: 22,749). In general, the year 2013 has been a significant jump in the number of attacks on new phones. Moreover, the end of the second quarter surpassed the barrier of 100,000 modifications (with 629 families of malware).

While the Trojans have excelled in SMS mobile attacks, their proportion in the database of Kaspersky Lab shows a different perspective.

The first place goes to Backdoors, with 32.3%, and secondly SMS Trojans with 23.2%. Category Trojans Trojan-Spy (Spies) are in fourth place with 4.9%. In terms of capabilities and flexibility, the trend of malicious programs for mobile devices converge with malware in the PC world. Samples abuse modern technology obfuscation to avoid security measures, and often carry several modules that make infection more persistent and extract information and then download and install additional malware.

Enjoy the

Administradores.com
on Facebook Follow on Twitter
Administrators to Receive Free Newsletter Administrators

  • Technology

    digital Darwinism gives rise to the phenomenon of gadgets that reinvents processes from new technologies

  • Technology

    Despite having party in 2004, his big plays are immortal in the memory of national and international football

  • Technology

    “This is an issue between countries. Google does not participate in it. Political espionage has to be dealt with in the government,” said director general

  • Technology

    Brazilian officials admit

    face the same problems as many other countries that were upset with the recent revelations about the NSA


No comments:

Post a Comment