Jump to content

Recommended Posts

  • ExTS Admin
Posted

http://exts.org/data/MetaMirrorCache/fd38ae435b938f346b763c402bb8eb95.jpg

 

Even if some malware families never get to cause worldwide damage, it's sometimes interesting to read about new techniques that certain malware authors employ to create their threats.

 

One of the most recent cases is a malware family that targets Android devices in China, discovered by Symantec and named Android.Spywaller.

 

The uniqueness of this threat is the fact that, during infection, the malware looks for Qihoo 360, a popular security app among Chinese Android users.

 

Android.Spywaller uses a firewall to block Qihoo 360 internal communications

 

The malware searches and registers on the device with the same UID (unique identifier) used by the Qihoo 360 app, and then loads a binary called DroidWall, a version of the UNIX iptable package, modified to run on Android devices.

 

The iptable package is a well-known firewall utility for Linux systems, and DroidWall was developed by independent security researchers Rodrigo Rosauro, who later sold it to AVAST in 2011. Since the app spent a few years as open source, malware authors can still find it via Google Code or GitHub repositories.

 

Just like in Android.Spywaller's case, DroidWall can be used to block security applications from communicating with their cloud-based threat analysis servers, rendering the security apps useless, and giving the malware free and safe access to the device.

 

Android.Spywaller infects devices by posing as a Google app

 

Symantec researchers say that the malware is not a very common infection among Chinese users, so there's nothing to worry about just yet.

 

To infect users, the malware poses as a Google app called "Google Service," taking advantage of the lack of an official Google Play Store in the country. (There is no official Google app called Google Service.)

 

Spreading via unofficial Android app stores and fooling users into giving it admin permissions, Android.Spywaller goes on to work in the phone's background, stealing information from the device, and then uploading it to one of its command servers.

 

One of the most complete Android spyware families ever discovered

 

Symantec reports that the app will search and exfiltrate data such as call logs, SMS, GPS readings, system browser data, emails, radio, images, and contact lists.

 

Additionally, the app also gathers data from other apps such as BlackBerry Messenger, Oovoo, Coco, QQ, SinaWeibo, Skype, Talkbox, TencentWeibo, Voxer, Wechat, WhatsApp, and Zello.

 

Researchers say that Android.Spywaller is one of the most intrusive spyware families they've found, the malware covering multiple data types and sources of information at once.

 

http://exts.org/data/MetaMirrorCache/61214cab3be824a78394268c3378af0d.jpg

Android.Spywaller hiding as Google Service app

 

 

Source:

http://news.softpedia.com/news/android-malware-uses-built-in-firewall-to-block-security-apps-498175.shtml

Member of:

UNITE

  • Replies 1
  • Created
  • Last Reply

Top Posters In This Topic

Top Posters In This Topic

Posted

Thanks very much will watch for that on my phone and tab.

 

 

 

ps you have gmail from me

Bob

(bob12a)

My 3D pictures need red cyan glasses to view

medion MD8855,Win 7 IE8, Firefox/3, Avast,MS security essentials, NERO 9,malware bytes.Mailwasher pro ,6.54,Roboform,spybot S&D 1.6, Canon ixus 860 X 2,PS CS5

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...