Monday, February 20, 2017
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Google, Bing Agree to Help U.K. Fight Pirate Sites
Researchers Create Printed ICs that Can Stretch
SK Telecom to Unveil Live Streaming Platform for 360 VR at MWC 2017
Samsung Develops 5G Mobile Communication Chip
LG Display Confirms LCD Supply Deal With Rival Samsung
LG's G6 Smartphone To Feature A Wide-angle Dual Camera
New Samsung Galaxy Tab S Series To Include Windows Version
Researchers Introduce New Wireless Charging Technology
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > Mobiles > 'GODLES...
Last 7 Days News : SU MO TU WE TH FR SA All News

Wednesday, June 22, 2016
'GODLESS' Android Mobile Malware Uses Multiple Exploits to Root Devices


Researchres at Trendmicro have came across a family of mobile malware called Godless (detected as ANDROIDOS_GODLESS.HRX) that has a set of rooting exploits in its pockets.

By having multiple exploits to use, Godless can target virtually any Android device running on Android 5.1 (Lollipop) or earlier. According to Trendmicro, almost 90% of Android devices are currently running on affected versions. Based on the data gathered from the Trend Micro Mobile App Reputation Service, malicious apps related to this threat can be found in prominent app stores, including Google Play, and has affected over 850,000 devices worldwide, with almost half in India and more in other southeast Asian countries. Less than 2 percent were in the U.S.

Godless is reminiscent of an exploit kit, in that it uses an open-source rooting framework called android-rooting-tools. The said framework has various exploits in its arsenal that can be used to root various Android-based devices.

In addition, with root privilege, the malware can then receive remote instructions on which app to download and silently install on mobile devices. This can then lead to affected users receiving unwanted apps, which may then lead to unwanted ads. Even worse, these threats can also be used to install backdoors and spy on users.

A newer variant can also bypass security checks at app stores like Google Play. Once the malware has finished its rooting, it can be tricky to uninstall, the security firm said.

Trend Micro said it found various apps in Google Play that contain the malicious code.

"The malicious apps we’ve seen that have this new remote routine range from utility apps like flashlights and Wi-Fi apps, to copies of popular game," the company said.

Some apps are clean but have a corresponding malicious version that shares the same developer certificate. The danger there is that users install the clean app but are then upgraded to the malicious version without them knowing.

"When downloading apps, regardless if it’s a utility tool or a popular game, users should always review the developer. Unknown developers with very little or no background information may be the source of these malicious apps," Trend said.

It's also best to download apps from trusted stores such as Google Play and Amazon, it says. And of course, Trend recommends you buy some mobile security software.



Previous
Next
SK Hynix to Promote Its MDS Technology        All News        PlayStation Vue Expands to Roku Today, Launching on Android Next Week
Can iPhone 7 Smartphones Fuel Sales?     Mobiles News      Samsung To Become An Apple OLED supplier

Get RSS feed Easy Print E-Mail this Message

Related News
Researchers Say 1 Million Google Accounts Breached by "Gooligan"
Android Devices Vulnerable To Physical RAM Attack
Millions Of Android Devices Infected With Chinese Malware
Fraunhofer SIT Finds Vulnerabilities in Android Security Apps
Android Ransomware Can Change Your Mobile's PIN Code

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .