14 June (Portaltic / EP) –
itemprop=”description”>
Kaspersky Lab has discovered the Trojan for Android more sophisticated than we have seen to date, Backdoor.AndroidOS.Obad.a. This invader is able to send SMS to premium numbers, download and install “malware” and execute commands remotely.
security company Kaspersky Lab has detected a Trojan for Android to analyze an application of that operating system. At first glance researchers and realized that it was a rather extraordinary application because all strings were encoded DEX file.
Backdoor.AndroidOS.Obad.a Trojan.
A feature of this Trojan is that malicious application can not be removed once it has got administrator privileges. By exploiting a vulnerability in Android that was unknown to the operating system of Google. Obad.a, the malicious application enjoys privileges extended , but not listed as an application device manager privileges.
After the first launch, the malicious application collects the following information : the MAC address of Bluetooth device, the operator’s name, phone number, IMEI number, the phone account balance user, if you got the Device Manager privileges or not, and local time. Once collected these data are sent to the C & C server to androfox.com as a JSON object encoding.According say researchers, Backdoor.AndroidOS.Obad.a is more like Windows malware than other Android Trojans on issues of complexity and amount of unpublished vulnerabilities exploited. This means that both the amount and the complexity of Android malware is growing at high speed.
Related links:
– Virulist.com
No comments:
Post a Comment