Jump to content


Photo

Over 1 Million Android devices pwned in China

Security Trojan China botnet

  • Please log in to reply
2 replies to this topic

#1 eyecre8

eyecre8

    Mod/News Team Leader

  • Moderator
  • 108 posts
  • Google+:eyecre8
  • LocationOhio/Florida
  • Current Device(s):2 Razr's (xt912) & Asus TF700T

Posted 16 January 2013 - 11:25 AM

Please Login or Register to see this Hidden Content

 

Please Login or Register to see this Hidden Content

  43.65KB   51 downloads

Security researchers have uncovered a monstrous mobile botnet in China comprised of over a whopping one million victims! The Trojan that powers the botnet, Android.Troj.mdk, was first discovered back in 2011. Lack of awareness over mobile security threats has attributed to the botnet breaking the one million victim mark.

The trojan has been found hidden in more than 7,000 apps, including popular games such as Temple Run and Fishing Joy. Questions about its wide dispersion are fueling concerns as to the trojan's origin and whether this was a state sponsored hack for the Chinese government to spy upon its residents. The malware was discovered on a third party marketplace (not the Android Market).

Security researches claim the following upon infection:

Please Login or Register to see this Hidden Content


The following data was seen transmitted by the malware:
  • IMEI number
  • Cell ID
  • IMSI number
  • Location Area Code
  • Mobile Network Code
There is also evidence the infected phones can be configured by botmasters to block all incoming messages from China's two largest mobile carriers. This is a technique used by previous Android malware, as it prevents customer service representatives from contacting infected customers.

As is common with hacking schemes on Android phones, unlicensed third-party app stores are likely to have played host to the Trojan before being downloaded by unsuspecting victims. Once installed, the attacker can remotely control the victim’s smartphone, enabling them to steal sensitive data, download additional apps and generate adware. Revenue generation results through premium SMS, telephony, and video services. Premium SMS numbers in China tend to cost around $0.15 to $0.30 per message, and while this may not seem particularly expensive, it quickly adds up when you factor in the number of active infected devices on the botnet and how most users likely would not notice the infection right away.We can see the botmaster is generating anywhere between $1,600 to $9,000 per day and $547,500 to $3,285,000 per year the botnet is running.

Kaspersky Labs conducted a study into which Android iteration was subject to the greatest security threat, and found that the now-outdated 2.3 Gingerbread version attracted the most attacks.

Users in China have since been advised to monitor their call and data records for unusual activity that may point to an infection.



VIA:

Please Login or Register to see this Hidden Content


Please Login or Register to see this Hidden Content


Please Login or Register to see this Hidden Content


My name is Eyecre8 and I approve this message!
Posted Image

#2 Daino92

Daino92

    Member

  • Members
  • PipPip
  • 258 posts
  • Google+:chrisdaino@gmail.com
  • LocationFort Collins
  • Current Device(s):SCH-1535

Posted 17 January 2013 - 07:43 AM

I'm glad there really haven't been any kind of major problems here in the states.

Sent from my SCH-I535 using Tapatalk 2


  • eyecre8 likes this

#3 johnlgalt

johnlgalt

    Antidisestablishmentarianist

  • Superuser
  • 7,296 posts
  • Twitter:https://twitter.com/JohnLGalt
  • Location3rd Rock
  • Current Device(s):Pixel 4 XL 128 GB

Posted 09 February 2013 - 09:40 AM

Hi,

Please Login or Register to see this Hidden Content

, and welcome to the forums!

Using Google Translate, It seems as if you're asking if we're sure they're always right (or if we're sure it is the government)...

Kaspersky Labs are pretty reputable, and I'd generally trust them when they make such statements.




1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users