Sunday, February 25, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
MWC: The Cat S61 Smartphone Measures Distances, Senses the Quality of Air
MWC: TCL Introduces Alcatel 5, 3 and 1 Smartphone Series, Android Oreo Smartphone and Tablets
IBM Researchers Talk About the Future of EUV at SPIE
Xiaomi and Microsoft Expand Their Collaboration in cloud, Devices and AI Areas
Google's Augmented Reality SDK ARCore 1.0 Released, Google Lens Updated
Google Assistant is Going Global
TEAC Releases New Reference Series Hi-Res Audio Models
First Affordable Android Go Smartphones Coming Next Week
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > PC Parts > Windows...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, January 24, 2014
Windows Malware Infects Android Devices


Researchers from Symantec found a Windows Trojan program that can install online banking malware on Android devices connected to infected PCs.

Until now, there was reported Android malware that attempted to infect Windows systems. But recently Symantec researcher Flora Liu came across something that works the other way round: a Windows threat that attempts to infect Android devices.

The infection starts with a Trojan named Trojan.Droidpak. It drops a malicious DLL (also detected as Trojan.Droidpak) and registers it as a system service. This DLL then downloads a configuration file from a remote server. It then parses the configuration file in order to download a malicious APK to the compromised computer. The DLL may also download necessary tools such as Android Debug Bridge (ADB).

Next, it installs ADB and uses a command shown to install the malicious APK to any Android devices connected to the compromised computer. Liu says that installation is attempted repeatedly in order to ensure a mobile device is infected when connected. Successful installation also requires the USB debugging Mode is enabled on the Android device.

USB debugging is a setting normally used by Android developers, but it's also required for some operations that are not directly related to development, like rooting the OS, taking screen captures on devices running old Android versions or installing custom Android firmware.

However, the malicious APK actually looks for certain Korean online banking applications on the compromised device and, if found, prompts users to delete them and install malicious versions. The malware also intercepts SMS messages on the compromised device and sends them to a remote server.

Liu advised users to turn off the USB debugging feature on their Android devices when not it's not needed and to be wary of connecting their mobile devices to computers they don't trust.




Previous
Next
Arctic Freezer i11/A11 CPU Coolers Released        All News        ASMedia Technologies Demonstrates USB 3.1 10Gbps
Arctic Freezer i11/A11 CPU Coolers Released     PC Parts News      ASMedia Technologies Demonstrates USB 3.1 10Gbps

Get RSS feed Easy Print E-Mail this Message

Related News
First Affordable Android Go Smartphones Coming Next Week
Telegram Messenger Vulnerability Spread Multipurpose Malware
Google Removed 700,000 Apps From Google Play in 2017
Fake Spectre and Meltdown Patch Pushes Malware
Google Releases Android Oreo Go Edition for Low-end Phones
Android Collects Android Users' Locations Using Cell-tower Data
Malware Spread Through PornHub
Google Assistant is now on Android TV
Google Teams With Xiaomi in Dual-camera M1 A1 Smartphone
Android Oreo is Rolling Out
Cloak and Dagger Security Hole in Android Discovered
Google I/O: Google Digital Assistant Coming to iPhone, Android O, Android Go, New TPU and VR

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .