Friday, December 19, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
T-Mobile to Pay $90 Million To Settle Case With FCC
New Trojan Targetted Banks Wordlwide
FBI Confirms North Korea Was Behind Sony Hack
Apple Responds To BBC's Allegations Over Working Conditions In Chinese Factory
BlackBerry Returns To Cash Flow
Comparison: Quantum Dot Vs. OLED Displays
Toshiba and SK Hynix Reach Settlement in Lawsuit Ahead Of CES
Google Concerned About MPAA's Actions To Revive SOPA
Active Discussions
Digital Audio Extraction and Plextools
Will there be any trade in scheme for the coming PSP Go?
Hello, Glad to be Aboard!!!
Best optical drive for ripping CD's? My LG 4163B is mediocre.
Hi All!
cdrw trouble
CDR for car Sat Nav
DVD/DL for Optiarc 7191S at 8X
 Home > News > Mobiles > Selfmit...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, June 27, 2014
Selfmite SMS Worm Attacks Android Devices


Security researchers have discovered an worm that propagates itself to other users via links in text messages and once installed, sends a text messages to 20 contacts from the device owner's address book.

According to security firm AdaptiveMobile, the worm, dubbed "Selfmite," is able to propagate via SMS. Potential victims receive the following SMS message containing a URL pointing to the Selfmite worm:

Dear [NAME], Look the Self-time, http://goo.gl/******

If the user clicks on the goo.gl shortened link he will be redirected to http://173.244.***.***/TheSelfTimerV1.apk and offered to download and install this APK file. If the user performs these actions then a malware icon with 'The self-timer' name appears in the smartphone's menu. And if victim launches it, the malware will immediately read device's contact book for a name + phone pair and send 1 message to 20 different contacts using the name as a greeting.

In addition to spreading itself to other users, the Selfmite worm tries to convince users to download and install a file called mobogenie_122141003.apk through the local browser.

Mobogenie is a legitimate application that allows users to synchronize their Android devices with their PCs and download apps from an alternative app store.

The security vendor said that it detected dozens of devices infected with Selfmite in North America.

The short goo.gl URL that was used to distribute the malicious APK was visited 2,140 times until Google disabled it. That doesn't mean attackers can't create another URL and launch a new attack campaign.

"The impact on the user is not only have they been fooled into installing a worm and other software they may not want; the worm can use up their billing plan by automatically sending messages that they would not be aware of, costing them money," the AdaptiveMobile researchers said. "In addition, by sending spam the worm puts the infected device at danger of being blocked by the mobile operator. More seriously, the URL that the worm points to [in the browser] could be redirected to point to other .apks which may not be as legitimate as the Mobogenie app."




Previous
Next
Aereo Pauses Service After Supreme Court Ruling        All News        Apple is Said To Develop Smart Home Devices
Microsoft May Use The Lumia Brand Instead Of Surface: rumor     Mobiles News      Latest Skype For Windows Phone Brings Cortana Integration

Get RSS feed Easy Print E-Mail this Message

Related News
Your Next Car Could Have Android Inside
Android Wear Updated To Lollipop
"NotCompatible" Malicious Software Spread on Android Phones
Moto 360 leads The First Wave of Android Wear Devices
Android And iOS Dominate 2014 Smartphone Market
Google Announces New Android Lollipop, Nexus 6 Smartphone, Nexus 9 Tablet And Nexus Player Streamer
Android L To Support Encryption By Default
First Low-cost Android One Phone Unveiled
First Android Apps Coming to Chromebooks
Android Gaming Consoles on the Horizon
Your Android Phone Is Telling the World Where You've Been
Android, Windows Phones To Feature Kill Switches

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .