Members
  • Total Members: 14176
  • Latest: toxxxa
Stats
  • Total Posts: 42939
  • Total Topics: 16139
  • Online Today: 4071
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)









Author Topic: Symantec warns: Protect your Android from Windows Trojan (Trojan.Droidpak)  (Read 5498 times)

0 Members and 1 Guest are viewing this topic.

Samker

  • SCF Administrator
  • *****
  • Posts: 7528
  • KARMA: 322
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum


A new computer Trojan program attempts to install mobile banking malware on Android devices when they’re connected to infected PCs, according to researchers from Symantec.

This method of targeting Android devices is unusual, since mobile attackers prefer social engineering and fake apps hosted on third-party app stores to distribute Android malware.

“We’ve seen Android malware that attempts to infect Windows systems before,” Symantec researcher Flora Liu, said Thursday in a blog post. “Android.Claco, for instance, downloads a malicious PE [portable executable] file along with an autorun.inf file and places them in the root directory of the SD card: http://www.symantec.com/connect/blogs/windows-malware-attempts-infect-android-devices
When the compromised mobile device is connected to a computer in USB mode, and if the AutoRun feature is enabled on the computer, Windows will automatically execute the malicious PE file.”

“Interestingly, we recently came across something that works the other way round: a Windows threat that attempts to infect Android devices,” Liu said.

The new malware, dubbed Trojan.Droidpak by Symantec: http://www.symantec.com/security_response/writeup.jsp?docid=2014-012109-2723-99 , drops a DLL file on the Windows computer and registers a new system service to ensure its persistence across reboots. It then downloads a configuration file from a remote server that contains the location of a malicious APK (Android application package) file called AV-cdk.apk.

The Trojan program downloads the malicious APK, as well as the Android Debug Bridge (ADB) command line tool that allows users to execute commands on Android devices connected to a PC: http://developer.android.com/tools/help/adb.html
ADB is part of the official Android software development kit (SDK).

The malware executes the “adb.exe install AV-cdk.apk” command repeatedly to ensure that if an Android device is connected to the host computer at any time, the malicious APK is silently installed on it. However, this approach has a limitation—it will work only if an option called “USB debugging” is enabled on the Android device.

USB debugging is a setting normally used by Android developers, but it’s also required for some operations that are not directly related to development, like rooting the OS, taking screen captures on devices running old Android versions or installing custom Android firmware. Even if this feature is rarely used, users who turn it on once to perform a particular task may forget to disable it when they don’t need it anymore.

The malicious APK distributed by this Windows malware is detected by Symantec as Android.Fakebank.B and masquerades as the official Google Play application: http://www.symantec.com/security_response/writeup.jsp?docid=2013-101114-5645-99
Once installed on a device, it uses the name “Google App Store” and the same icon as the legitimate Google Play app.

The malware appears to target online banking users from South Korea.

“The malicious APK actually looks for certain Korean online banking applications on the compromised device and, if found, prompts users to delete them and install malicious versions,” Liu said. It also intercepts SMS messages received by the user and sends them a remote server.

The targeting of online banking apps and the theft of SMS messages that can contain transaction authorization sent by banks suggest the motivation of this malware’s authors is bank fraud.

Even if this particular threat targets users from a single country, malware coders commonly borrow ideas from each other and replicate successful attack methods.

Liu advised users to turn off the USB debugging feature on their Android devices when not it’s not needed and to be wary of connecting their mobile devices to computers they don’t trust.

(PCW)

Samker's Computer Forum - SCforum.info


devnullius

  • SCF VIP Member
  • *****
  • Posts: 3614
  • KARMA: 157
  • Gender: Female
    • SCForum.info
Hm, sounds familiar. Wasn't there a Windows virus out there in December last year that was looking for mobile android phones?

Thanx for the head-ups.

For others worrying, install Xposed installer. It has many bug-plugs, like Master Key multi-fix and more. Test modules one-by-one, they often are very hardware dependant.

Karma! Not to be repeated within 24 hours...



devnullius
More information about bitcoin, altcoin & crypto in general? GO TO  j.gs/7385484/btc

Cuisvis hominis est errare, nullius nisi insipientis in errore persevare... So why not get the real SCForum employees to help YOUR troubled computer!!! SCF Remote PC Assist http://goo.gl/n1ONa9

devnullius

  • SCF VIP Member
  • *****
  • Posts: 3614
  • KARMA: 157
  • Gender: Female
    • SCForum.info
Also, to protect yourself for strange computers (needed when charging, most often :)), I like adbd protected https://play.google.com/store/apps/details?id=com.stericson.adbSecure

Karma

devnullius
More information about bitcoin, altcoin & crypto in general? GO TO  j.gs/7385484/btc

Cuisvis hominis est errare, nullius nisi insipientis in errore persevare... So why not get the real SCForum employees to help YOUR troubled computer!!! SCF Remote PC Assist http://goo.gl/n1ONa9

Samker

  • SCF Administrator
  • *****
  • Posts: 7528
  • KARMA: 322
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum
Hm, sounds familiar. Wasn't there a Windows virus out there in December last year that was looking for mobile android phones?

...

It is in September, but in the opposite direction: http://scforum.info/index.php/topic,8353.0.html

*I found it by SCF's search. ;D

devnullius

  • SCF VIP Member
  • *****
  • Posts: 3614
  • KARMA: 157
  • Gender: Female
    • SCForum.info
More information about bitcoin, altcoin & crypto in general? GO TO  j.gs/7385484/btc

Cuisvis hominis est errare, nullius nisi insipientis in errore persevare... So why not get the real SCForum employees to help YOUR troubled computer!!! SCF Remote PC Assist http://goo.gl/n1ONa9

Samker's Computer Forum - SCforum.info


Samker

  • SCF Administrator
  • *****
  • Posts: 7528
  • KARMA: 322
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum

devnullius

  • SCF VIP Member
  • *****
  • Posts: 3614
  • KARMA: 157
  • Gender: Female
    • SCForum.info
Photoshopped, no doubt!

See that arrow? Ain't legit at all!


;p

D
More information about bitcoin, altcoin & crypto in general? GO TO  j.gs/7385484/btc

Cuisvis hominis est errare, nullius nisi insipientis in errore persevare... So why not get the real SCForum employees to help YOUR troubled computer!!! SCF Remote PC Assist http://goo.gl/n1ONa9

Samker

  • SCF Administrator
  • *****
  • Posts: 7528
  • KARMA: 322
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum
Photoshopped, no doubt!

See that arrow? Ain't legit at all!


;p

D

 ;D :thumbsup:

Thank god, You see search terms "android windows"... now, you have no more arguments, that search doesn't work properly. ;)

*FYI, I set some new parameters for search, before few days... so, when you use search, just try with different combinations of search terms.

Samker's Computer Forum - SCforum.info


 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising