Wednesday, June 20, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Verizon, Sprint, AT&T and T-Mobile To Stop Sharing Cell Phone Location Data
Hackers Breached Satellite, Defense Companies
Benchmarks With the 32-core AMD Threadripper Appear Online
Facebook Offers More Tools To Video Creators
Western Digital Adds 12TB Western Digital Purple Drive to Surveillance Portfolio
Toshiba Delivers RM5 vSAS Series SSDs Targeting SATA Applications
Noctua launches CPU Coolers for LGA3647 Intel Xeon Platforms
Google to Bring Support for Android Messages to Desktop Browser
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > PC Parts > Windows...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, January 24, 2014
Windows Malware Infects Android Devices


Researchers from Symantec found a Windows Trojan program that can install online banking malware on Android devices connected to infected PCs.

Until now, there was reported Android malware that attempted to infect Windows systems. But recently Symantec researcher Flora Liu came across something that works the other way round: a Windows threat that attempts to infect Android devices.

The infection starts with a Trojan named Trojan.Droidpak. It drops a malicious DLL (also detected as Trojan.Droidpak) and registers it as a system service. This DLL then downloads a configuration file from a remote server. It then parses the configuration file in order to download a malicious APK to the compromised computer. The DLL may also download necessary tools such as Android Debug Bridge (ADB).

Next, it installs ADB and uses a command shown to install the malicious APK to any Android devices connected to the compromised computer. Liu says that installation is attempted repeatedly in order to ensure a mobile device is infected when connected. Successful installation also requires the USB debugging Mode is enabled on the Android device.

USB debugging is a setting normally used by Android developers, but it's also required for some operations that are not directly related to development, like rooting the OS, taking screen captures on devices running old Android versions or installing custom Android firmware.

However, the malicious APK actually looks for certain Korean online banking applications on the compromised device and, if found, prompts users to delete them and install malicious versions. The malware also intercepts SMS messages on the compromised device and sends them to a remote server.

Liu advised users to turn off the USB debugging feature on their Android devices when not it's not needed and to be wary of connecting their mobile devices to computers they don't trust.




Previous
Next
Arctic Freezer i11/A11 CPU Coolers Released        All News        ASMedia Technologies Demonstrates USB 3.1 10Gbps
Arctic Freezer i11/A11 CPU Coolers Released     PC Parts News      ASMedia Technologies Demonstrates USB 3.1 10Gbps

Get RSS feed Easy Print E-Mail this Message

Related News
Google to Bring Support for Android Messages to Desktop Browser
FBI Says Reboot Your Router to Stop Malware Infecting 500k Devices
Roaming Mantis Malware Infects Smartphones Through Wi-fi Routers
Google Releases Android P Beta, Previews Features at I/O
Google Launches Android Things Platform for Smart Devices
Volvo Cars to Embed Google Assistant, Google Play Store and Google Maps in Infotainment System
ZooPark Android Malware Tracks all Your Phone Activities
Android Ecosystem Remains Fragmented
Android Wear Becomes Wear OS by Google
Microsoft Launches $250,000 Security Bounty
Peer-to-peer App Kicked off Dofoil Coin Miner Outbreak
Google Previews Android P

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .