Tuesday, April 24, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Samsung Unveiled New Onyx Cinema LED Screen at CinemaCon
Samsung's Fastest 970 PRO and EVO NVMe SSDs Are Launching Worldwide
Music Streaming Becomes Largest Revenue Source, Physical Sales Decline
New Wi-Fi Capabilities Provide Context-aware Services
Facebook Outlines Internal Enforcement Guidelines For the First time
CyberLink Launches First AI Style Video Editing Plugin for Windows PC
Amazon to Bring Packages Inside Your Locked Car
Xiaomi Takes the Lead in the Indian Smartphone Market
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > PC Parts > Windows...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, January 24, 2014
Windows Malware Infects Android Devices


Researchers from Symantec found a Windows Trojan program that can install online banking malware on Android devices connected to infected PCs.

Until now, there was reported Android malware that attempted to infect Windows systems. But recently Symantec researcher Flora Liu came across something that works the other way round: a Windows threat that attempts to infect Android devices.

The infection starts with a Trojan named Trojan.Droidpak. It drops a malicious DLL (also detected as Trojan.Droidpak) and registers it as a system service. This DLL then downloads a configuration file from a remote server. It then parses the configuration file in order to download a malicious APK to the compromised computer. The DLL may also download necessary tools such as Android Debug Bridge (ADB).

Next, it installs ADB and uses a command shown to install the malicious APK to any Android devices connected to the compromised computer. Liu says that installation is attempted repeatedly in order to ensure a mobile device is infected when connected. Successful installation also requires the USB debugging Mode is enabled on the Android device.

USB debugging is a setting normally used by Android developers, but it's also required for some operations that are not directly related to development, like rooting the OS, taking screen captures on devices running old Android versions or installing custom Android firmware.

However, the malicious APK actually looks for certain Korean online banking applications on the compromised device and, if found, prompts users to delete them and install malicious versions. The malware also intercepts SMS messages on the compromised device and sends them to a remote server.

Liu advised users to turn off the USB debugging feature on their Android devices when not it's not needed and to be wary of connecting their mobile devices to computers they don't trust.




Previous
Next
Arctic Freezer i11/A11 CPU Coolers Released        All News        ASMedia Technologies Demonstrates USB 3.1 10Gbps
Arctic Freezer i11/A11 CPU Coolers Released     PC Parts News      ASMedia Technologies Demonstrates USB 3.1 10Gbps

Get RSS feed Easy Print E-Mail this Message

Related News
Android Ecosystem Remains Fragmented
Android Wear Becomes Wear OS by Google
Microsoft Launches $250,000 Security Bounty
Peer-to-peer App Kicked off Dofoil Coin Miner Outbreak
Google Previews Android P
First Affordable Android Go Smartphones Coming Next Week
Telegram Messenger Vulnerability Spread Multipurpose Malware
Google Removed 700,000 Apps From Google Play in 2017
Fake Spectre and Meltdown Patch Pushes Malware
Google Releases Android Oreo Go Edition for Low-end Phones
Android Collects Android Users' Locations Using Cell-tower Data
Malware Spread Through PornHub

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .