A newborn Dardanian is making waves not meet for the alteration it crapper cause Android smartphones, but for how it goes most wreaking that havoc.
Like added Trojans targeting Google's smartphone platform, the Dardanian identified by the section concern Trend Micro as "ANDROIDOS_ANSERVER.A" is confident of accessing stored noesis on users' devices as substantially as making calls, restarting apps and sending and receiving book messages. And same kindred malware, the Dardanian hides itself in an app; ANDROIDOS_ANSERVER.A was found embedded in an e-book reverend app acquirable for download in a third-party Asiatic Android app store.
However, this Dardanian is different: It puts added follow in the spokes of smartphone section by receiving its grievous instructions and move codes from a blog.
The Dardanian gathers aggregation from the pussy device, Trend Micro explained, and then uses the journal to amount discover which command-and-control computer to enter to. The Dardanian then receives an XML enter from the vindictive server, which includes a address where the Dardanian crapper update itself to meet aweigh of software fashioned to notice and decimate it.
"This is a journal place with encrypted content, which, supported on our research, is the prototypal instance Android malware implemented this kind of framework to communicate," Trend Micro's Karl Dominguez wrote on a consort blog.
Trend Micro institute 18 variations of the Dardanian posted to the blog from July 23 to Sept. 26. One constituent to the Dardanian allows it to alter quaternary security-related apps.
To attain trusty you don't start beast to this or some smartphone malware, download exclusive apps from trusty sources, much as the authorised Android Market or iTunes, and never from third-party websites. And attain trusty to feature an app's individual comments to wager if it has conventional perverse reviews from consumers or has been flagged as corrupt.
© 2011 SecurityNewsDaily. All rights reserved
0 comments:
Post a Comment