Members
  • Total Members: 14176
  • Latest: toxxxa
Stats
  • Total Posts: 42939
  • Total Topics: 16139
  • Online Today: 4071
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)









Author Topic: Android Fake AV Hosted in Google Code Targets South Koreans  (Read 2786 times)

0 Members and 1 Guest are viewing this topic.

Pez

  • SCF VIP Member
  • *****
  • Posts: 776
  • KARMA: 117
  • Gender: Male
  • Pez
Android Fake AV Hosted in Google Code Targets South Koreans
« on: 02. September 2013., 09:43:58 »
Android Fake AV Hosted in Google Code Targets South Koreans

During the last two years we have observed the accelerated discovery of Android malware by the security industry. Malware authors today often create and distribute fake “antimalware” apps that simulate the scan of files on a device. These fake apps report fake threats (and sometimes make the device unusable). The goal is to get victims to pay for the “full version” of the software to eliminate the nonexistent infections.

However, not all “fake AV” threats pursue monetary gain directly by scaring users with fake threats or denying access to the infected devices. Sometimes malware authors use the good reputation of legitimate security software to trick users into installing malware that executes commands sent by a remote control server to perform tasks in the background–such as stealing sensitive information from infected devices and sending SMS messages without the users’ consent.

Recently the McAfee Mobile Research team has received a new type of Android fake AV that targets South Korean users. The malware pretends to be the security software V3 Mobile Plus:



Icon used by the malware.

When the application executes for the first time, a fake system scan shows fake information such as the current file being scanned–basically a string in the code–the number of files scanned at that moment (13,887 in the following screenshot) and a simulated progress bar:



Fake system scan.

After a few seconds the fake scan finishes and the following summary is presented to the user: One malware found (already removed) and 19,266 files (always the same number) were analyzed.



Fake system scan summary.

After the user clicks the button “확인,” the app closes itself and the icon that was present when the app was installed disappears from the main menu, making the user believe that the app was uninstalled. In fact, the icon is merely hidden and a service starts in the background. The service will register the infected device with control server by sending encoded sensitive information of the infected device such as the phone number and network operator:



Malware registering the infected device.

After that the malware constantly checks for new tasks to be executed remotely. These include sending SMS messages with parameters (number and content) from the remote server; this feature can be abused to send premium-rate messages. In addition to this functionality, the malware will silently intercept all incoming SMS messages to send the sender’s encoded phone number and content to a remote server:



SMS leaked.

This Android malware was found in a Google code project, and it’s not the first time we’ve seen that. However, in this particular Google code project (which has already been removed) Android malware was joined by Windows malware:



Android and Windows malware in a Google code project.

McAfee Mobile Security detects the Android threat as Android/FakeAhnAV.A and the Windows threats are detected by McAfee VirusScan/Total Protection as BackDoor-DKA, Generic BackDoor.u, Generic Dropper.i, and Generic BackDoor.abf.


Original article: Friday, August 16, 2013 at 11:06am by Carlos Castillo
Their is two easy way to configure a system!
Every thing open and every thing closed.
Every thing else is more or less complex.

Start Turfing ! http://scforum.info/index.php/topic,8405.msg21475.html#msg21475

Samker's Computer Forum - SCforum.info

Android Fake AV Hosted in Google Code Targets South Koreans
« on: 02. September 2013., 09:43:58 »

 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising