Tuesday, March 28, 2017
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
New Intel Xeon Processor E3-1200 v6 Product Family Targets Pros
Google Assistant Is Coming To More Connected Devices
Self-assembly Technique Could Solve Miniaturization Chip Making Issues
Prepare For Battle GeForce GTX Bundle Includes For Honor or Tom Clancy's Ghost Recon Wildlands Games
VIZIO's 2017 D-Series Smart TV Collection Includes 4K Ultra HD Support in Select Models
Facebook Attacks Snapchat With New Camera Features
China Tech Giant Tencent Buys 5 Percent Stake In Tesla
Hyundai Motor To Develop Its Own Automotive Chips
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > PC Parts > Windows...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, January 24, 2014
Windows Malware Infects Android Devices


Researchers from Symantec found a Windows Trojan program that can install online banking malware on Android devices connected to infected PCs.

Until now, there was reported Android malware that attempted to infect Windows systems. But recently Symantec researcher Flora Liu came across something that works the other way round: a Windows threat that attempts to infect Android devices.

The infection starts with a Trojan named Trojan.Droidpak. It drops a malicious DLL (also detected as Trojan.Droidpak) and registers it as a system service. This DLL then downloads a configuration file from a remote server. It then parses the configuration file in order to download a malicious APK to the compromised computer. The DLL may also download necessary tools such as Android Debug Bridge (ADB).

Next, it installs ADB and uses a command shown to install the malicious APK to any Android devices connected to the compromised computer. Liu says that installation is attempted repeatedly in order to ensure a mobile device is infected when connected. Successful installation also requires the USB debugging Mode is enabled on the Android device.

USB debugging is a setting normally used by Android developers, but it's also required for some operations that are not directly related to development, like rooting the OS, taking screen captures on devices running old Android versions or installing custom Android firmware.

However, the malicious APK actually looks for certain Korean online banking applications on the compromised device and, if found, prompts users to delete them and install malicious versions. The malware also intercepts SMS messages on the compromised device and sends them to a remote server.

Liu advised users to turn off the USB debugging feature on their Android devices when not it's not needed and to be wary of connecting their mobile devices to computers they don't trust.




Previous
Next
Arctic Freezer i11/A11 CPU Coolers Released        All News        ASMedia Technologies Demonstrates USB 3.1 10Gbps
Arctic Freezer i11/A11 CPU Coolers Released     PC Parts News      ASMedia Technologies Demonstrates USB 3.1 10Gbps

Get RSS feed Easy Print E-Mail this Message

Related News
Google Plans Faster Updates To Keep Android Phones Safe
Android O Brings Better Battery Life and Notifications
Google Family Link app Will Help You Monitor Your Kid's Android Device
Preinstalled Malware May Be Targeting Your Android Phone
Android Challenges Windows Operating System in Terms of Internet Usage
New Mac OS X Malware Steal Passwords, And iPhone Backups
Android Wear 2.0 Goes Live With New LG Watch Sport And Style Smartwatches, Verizon's First Smartwatch
Google Assistant Coming on Android TVs
Google To Launch First Android Wear 2.0 Smartwatches Early 2017
Qualcomm to Collaborate with Google on Android Things OS
Android 7.1.1 Update Coming To Google Smartphones
Researchers Say 1 Million Google Accounts Breached by "Gooligan"

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .