Godlike Productions - Discussion Forum
Users Online Now: 1,719 (Who's On?)Visitors Today: 160,501
Pageviews Today: 209,481Threads Today: 47Posts Today: 775
01:37 AM


Back to Forum
Back to Forum
Back to Thread
Back to Thread
REPLY TO THREAD
Subject Android malware emerges on Google Play which installs a trojan on your PC, uses your microphone to record you
User Name
 
 
Font color:  Font:








In accordance with industry accepted best practices we ask that users limit their copy / paste of copyrighted material to the relevant portions of the article you wish to discuss and no more than 50% of the source material, provide a link back to the original article and provide your original comments / criticism in your post with the article.
Original Message We’ve seen malware for PCs that infects mobile devices, but it turns out there’s also malware for mobile devices designed to infect PCs. Kaspersky researchers have discovered a new piece of Android malware that masquerades as a “cleaner” app meant to free memory for Google’s operating system but wreaks havoc on your smartphone in the background and on Microsoft’s operating system when it’s connected to a PC.

The security firm says the malware has the most “extensive feature set” it has ever seen in one mobile app. Here’s the list:

Sending SMS messages.
Enabling Wi-Fi.
Gathering information about the device.
Opening arbitrary links in a browser.
Uploading the SD card’s entire contents.
Uploading an arbitrary file (or folder) to the master’s server.
Uploading all SMS messages.
Deleting all SMS messages.
Uploading all the contacts/photos/coordinates from the device to the master.
Once installed and executed on Android, the malicious app lists the running processes on your device and restarts them in the foreground to make it look like it’s doing what it’s designed to do. In the background, however, the app downloads three files (autorun.inf, folder.ico, and svchosts.exe) to the root of your SD card. When the smartphone is connected to a Windows computer in USB drive emulation mode, the svchosts.exe file (Backdoor.MSIL.Ssucl.a) is automatically executed on your PC.

The Windows part of the malware is not particularly sophisticated, but it is capable of taking control of the microphone to record you. It then encrypts all its recordings and sends them back to the attacker. Kaspersky explains how the malware authors are expecting this threat to spread:

Generally speaking, saving autorun.inf and a PE file to a flash drive is one of the most unsophisticated ways of distributing malware. At the same time, doing this using a smartphone and then waiting for the smartphone to connect to a PC is a completely new attack vector. In the current versions of Microsoft Windows, the AutoRun feature is disabled by default for external drives; however, not all users have migrated to modern operating systems. It is those users who use outdated OS versions that are targeted by this attack vector.

Read more [link to thenextweb.com]
Pictures (click to insert)
5ahidingiamwithranttomatowtf
bsflagIdol1hfbumpyodayeahsure
banana2burnitafros226rockonredface
pigchefabductwhateverpeacecool2tounge
 | Next Page >>





GLP