Monday, January 23, 2017
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Hon Hai chief Mulls US$7 Billion Display Panel Investment in U.S.
Apple Sues Qualcomm Over Patent Royalties
Sharp Establishes New Research and Development Center for Home Appliances in China
Samsung Seeks Arbitration Over LCD Supply Halt
Canon May Invest In Toshiba's Chip Business
Samsung To Explain What Caused The Galaxy Note 7's ban In Press Event
Nintendo's 'Fire Emblem Heroes' Smartphone Game features in-app Purchases
Fujifilm X-T20 Features New 24MP Sensor and 4K Video Capture
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > PC Parts > Windows...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, January 24, 2014
Windows Malware Infects Android Devices


Researchers from Symantec found a Windows Trojan program that can install online banking malware on Android devices connected to infected PCs.

Until now, there was reported Android malware that attempted to infect Windows systems. But recently Symantec researcher Flora Liu came across something that works the other way round: a Windows threat that attempts to infect Android devices.

The infection starts with a Trojan named Trojan.Droidpak. It drops a malicious DLL (also detected as Trojan.Droidpak) and registers it as a system service. This DLL then downloads a configuration file from a remote server. It then parses the configuration file in order to download a malicious APK to the compromised computer. The DLL may also download necessary tools such as Android Debug Bridge (ADB).

Next, it installs ADB and uses a command shown to install the malicious APK to any Android devices connected to the compromised computer. Liu says that installation is attempted repeatedly in order to ensure a mobile device is infected when connected. Successful installation also requires the USB debugging Mode is enabled on the Android device.

USB debugging is a setting normally used by Android developers, but it's also required for some operations that are not directly related to development, like rooting the OS, taking screen captures on devices running old Android versions or installing custom Android firmware.

However, the malicious APK actually looks for certain Korean online banking applications on the compromised device and, if found, prompts users to delete them and install malicious versions. The malware also intercepts SMS messages on the compromised device and sends them to a remote server.

Liu advised users to turn off the USB debugging feature on their Android devices when not it's not needed and to be wary of connecting their mobile devices to computers they don't trust.




Previous
Next
Arctic Freezer i11/A11 CPU Coolers Released        All News        ASMedia Technologies Demonstrates USB 3.1 10Gbps
Arctic Freezer i11/A11 CPU Coolers Released     PC Parts News      ASMedia Technologies Demonstrates USB 3.1 10Gbps

Get RSS feed Easy Print E-Mail this Message

Related News
Google Assistant Coming on Android TVs
Google To Launch First Android Wear 2.0 Smartwatches Early 2017
Qualcomm to Collaborate with Google on Android Things OS
Android 7.1.1 Update Coming To Google Smartphones
Researchers Say 1 Million Google Accounts Breached by "Gooligan"
Google Says Android Helps Competition
Sprint To Upgraded SMS To Android Users
Android Devices Vulnerable To Physical RAM Attack
ZTE Will Launch 4K Capable Android TV Set-Top-Box at Broadband World Forum 2016
Google Offers Up To $200K In Android Vulnerability Rewards Program
Android 7.0 Nougat Released For Nexus Devices And LG V20
Millions Of Android Devices Infected With Chinese Malware

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .