Breaking News

KIOXIA Introduces EXCERIA BASIC SSD Series for Affordable PCIe 4.0 Upgrades First look at PlayStation’s 27” Gaming Monitor New Transcend CFexpress 830 Type B Targets 8K RAW, High-Speed Shooting, and Pro Video Production Firewalla Launches MSP 2.9: Introducing FireAI Search, AP7 Wi-Fi Management, Enhanced User Support, Mobile App Access Control Elgato Launches Retail-Exclusive, Discord-Edition Stream Deck Mini

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Android Trojan Steals Passwords Sent Through Voice Calls

Android Trojan Steals Passwords Sent Through Voice Calls

Smartphones Jan 13,2016 0

In the last quarter of 2015,an information stealing Android threat - detected by Symantec as Android.Bankosy - added functionality to its code that can enable it to deceive voice call-based two-factor authorization (2FA) systems. In a typical 2FA system, the second factor - normally a generated one-time passcode (OTP) - is sent to the user’s registered mobile number through short messaging service (SMS). In the past, we have seen several cases where the malware installed on the victim’s device snooped on or intercepted the incoming SMS containing the OTP. To improve the security of OTP delivery, some financial organizations started delivering OTP through voice calls instead of SMS. Of course, malware creators have already devised ways to take advantage of this development.

According to Symantec, once the Android.Bankosy malware is installed on the victim’s device, it opens a back door, collects a list of system-specific information, and sends it to the command and control (C&C) server to register the device and then get a unique identifier for the infected device. If the registration is successful, it uses the received unique identifier to further communicate with the C&C server and receive commands.

Most of the commands supported by the malware are common and trivial for typical back door or financial Trojans, such as intercepting incoming SMS, deleting SMS messages, wiping the data, etc. Symantec says that the most relevant for Android.Bankosy is call_forwarding; when this command is received by the malware from the C&C server, it executes a payload to enable call forwarding.

The back door also has support for disabling and enabling silent mode, in addition to locking the device, so that the victim is not alerted during an incoming call.

Once the unconditional call forwarding is set on the victim’s device, the attacker - who has already stolen the victim’s credentials (the first factor in two-factor authentication and authorization) - can then initiate a transaction. As part of the design, when the system demands the victim to enter the second factor (i.e., the authorization token sent through a voice call), the attacker will get the call through call forwarding and enter the second factor as well to complete the transaction.

To protect against this kind of threat on mobile devices, Symantec recommends users observe the following security best practices:

  • Keep your software up to date
  • Refrain from downloading apps from unfamiliar sites
  • Only install apps from trusted sources
  • Pay close attention to the permissions requested by an app
  • Install a suitable mobile security app, such as Norton, in order to protect your device and data
  • Make frequent backups of important data


Tags: trojansandroid
Previous Post
LG To Invest Additional $435 Million In Solar Cell Production
Next Post
Hitachi-LG Data Storage Joins Microsoft’s Windows Rally Program

Related Posts

  • What’s new in Android 15, plus more updates

  • Connecting all things Android at MWC Barcelona

  • New features for businesses in Android 13

  • Lucky number Android 13: The latest features and updates

  • What’s beta than Android 13?

  • HLDS UD Station DVDRW (Preview)

  • Android Gets a New Keyboard for Typing Braille

  • New Opera for Android Offers More Data Savings, New Blockchain-browsing Features

Latest News

KIOXIA Introduces EXCERIA BASIC SSD Series for Affordable PCIe 4.0 Upgrades
PC components

KIOXIA Introduces EXCERIA BASIC SSD Series for Affordable PCIe 4.0 Upgrades

First look at PlayStation’s 27” Gaming Monitor
Gaming

First look at PlayStation’s 27” Gaming Monitor

New Transcend CFexpress 830 Type B Targets 8K RAW, High-Speed Shooting, and Pro Video Production
Cameras

New Transcend CFexpress 830 Type B Targets 8K RAW, High-Speed Shooting, and Pro Video Production

Firewalla Launches MSP 2.9: Introducing FireAI Search, AP7 Wi-Fi Management, Enhanced User Support, Mobile App Access Control
Enterprise & IT

Firewalla Launches MSP 2.9: Introducing FireAI Search, AP7 Wi-Fi Management, Enhanced User Support, Mobile App Access Control

Elgato Launches Retail-Exclusive, Discord-Edition Stream Deck Mini
Consumer Electronics

Elgato Launches Retail-Exclusive, Discord-Edition Stream Deck Mini

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed