Breaking News

HighPoint introduces Industry’s First Hardware Architecture for GPU-Direct NVMe Storage Panasonic Introduces the First Ultra-Telephoto Zoom Lens in the LUMIX S Series CORSAIR announces Vanguard Pro 96 and Vanguard 96 Gaming Keyboards Viltrox Spark Z3 TTL On-Camera Flash Transcend Launches Next-Gen microSD Express USD710S

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Windows Malware Infects Android Devices

Windows Malware Infects Android Devices

PC components Jan 24,2014 0

Researchers from Symantec found a Windows Trojan program that can install online banking malware on Android devices connected to infected PCs. Until now, there was reported Android malware that attempted to infect Windows systems. But recently Symantec researcher Flora Liu came across something that works the other way round: a Windows threat that attempts to infect Android devices.

The infection starts with a Trojan named Trojan.Droidpak. It drops a malicious DLL (also detected as Trojan.Droidpak) and registers it as a system service. This DLL then downloads a configuration file from a remote server. It then parses the configuration file in order to download a malicious APK to the compromised computer. The DLL may also download necessary tools such as Android Debug Bridge (ADB).

Next, it installs ADB and uses a command shown to install the malicious APK to any Android devices connected to the compromised computer. Liu says that installation is attempted repeatedly in order to ensure a mobile device is infected when connected. Successful installation also requires the USB debugging Mode is enabled on the Android device.

USB debugging is a setting normally used by Android developers, but it's also required for some operations that are not directly related to development, like rooting the OS, taking screen captures on devices running old Android versions or installing custom Android firmware.

However, the malicious APK actually looks for certain Korean online banking applications on the compromised device and, if found, prompts users to delete them and install malicious versions. The malware also intercepts SMS messages on the compromised device and sends them to a remote server.

Liu advised users to turn off the USB debugging feature on their Android devices when not it's not needed and to be wary of connecting their mobile devices to computers they don't trust.

Tags: androidmalware
Previous Post
Arctic Freezer i11/A11 CPU Coolers Released
Next Post
ASMedia Technologies Demonstrates USB 3.1 10Gbps

Related Posts

  • What’s new in Android 15, plus more updates

  • Connecting all things Android at MWC Barcelona

  • New features for businesses in Android 13

  • Lucky number Android 13: The latest features and updates

  • What’s beta than Android 13?

  • HLDS UD Station DVDRW (Preview)

  • Intel and Microsoft Convert Malware to Images to Spot Threads Faster

  • Android Gets a New Keyboard for Typing Braille

Latest News

HighPoint introduces Industry’s First Hardware Architecture for GPU-Direct NVMe Storage
Enterprise & IT

HighPoint introduces Industry’s First Hardware Architecture for GPU-Direct NVMe Storage

Panasonic Introduces the First Ultra-Telephoto Zoom Lens in the LUMIX S Series
Cameras

Panasonic Introduces the First Ultra-Telephoto Zoom Lens in the LUMIX S Series

CORSAIR announces Vanguard Pro 96 and Vanguard 96 Gaming Keyboards
PC components

CORSAIR announces Vanguard Pro 96 and Vanguard 96 Gaming Keyboards

Viltrox Spark Z3 TTL On-Camera Flash
Cameras

Viltrox Spark Z3 TTL On-Camera Flash

Transcend Launches Next-Gen microSD Express USD710S
Cameras

Transcend Launches Next-Gen microSD Express USD710S

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

be quiet! Pure Base 501

be quiet! Pure Base 501

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed