Friday, June 14, 2013

A new Android Trojan installed "malware" and execute commands ... - Reuters

MADRID

14 June (Portaltic / EP) –

itemprop=”description”>

Kaspersky Lab has discovered the Trojan for Android more sophisticated than we have seen to date, Backdoor.AndroidOS.Obad.a. This invader is able to send SMS to premium numbers, download and install “malware” and execute commands remotely.

security company Kaspersky Lab has detected a Trojan for Android to analyze an application of that operating system. At first glance researchers and realized that it was a rather extraordinary application because all strings were encoded DEX file.

Backdoor.AndroidOS.Obad.a

Trojan. is able to perform actions from sending SMS to premium rate numbers to download and install malware on the infected device or forward it via Bluetooth. Furthermore, also has the power to remotely execute commands on the console.

A feature of this Trojan is that malicious application can not be removed once it has got administrator privileges. By exploiting a vulnerability in Android that was unknown to the operating system of Google. Obad.a, the malicious application enjoys privileges extended , but not listed as an application device manager privileges.

After the first launch, the malicious application collects the following information : the MAC address of Bluetooth device, the operator’s name, phone number, IMEI number, the phone account balance user, if you got the Device Manager privileges or not, and local time. Once collected these data are sent to the C & C server to androfox.com as a JSON object encoding.

According say researchers, Backdoor.AndroidOS.Obad.a is more like Windows malware than other Android Trojans on issues of complexity and amount of unpublished vulnerabilities exploited. This means that both the amount and the complexity of Android malware is growing at high speed.

Related links:

– Virulist.com

No comments:

Post a Comment