backtop


Print 13 comment(s) - last by JimmiG.. on Aug 12 at 3:29 PM

Malware stops its fraud after one run to avoid raising suspicion

Some Android users have found themselves the victim of perhaps the first full-fledged Trojan to hit the system.  Our story on the trojan yesterday drew a great deal of attention, so we decided to dig into this one a bit deeper.

A reader -- Jon Oberheimer -- founder of security startup Scio Security and Ph.D candidate at the University of Michigan, writes us that he obtained the dreaded Android trojan, disassembled it, and posted an analysis in gory detail.

From his results it's readily apparent that the effort is amateurish, but slightly clever.  The program bears a great deal of similarity to the "HelloWorld" tutorial hosted by Google for aspiring developers.  It even prints a string "Hello Android from NetBeans".

When the MoviePlayer activity of the app fires up, it triggers the app's onCreate event.  This event checks an SQLite database with a single table and column to see if a string "was" was previously written.  Here comes the (
sort of) clever part -- on the malware's first run, after accomplishing its ill objectives it writes the string to the database.  That way on subsequent runs, the string is detected and the program merely exits without continuing the attack.  By doing as such, it's able to keep a low profile and its evil actions might escape notice.

Returning to the actions themselves, assuming it's the first time the app has been run, the app tries to broadcast an SMS text message to premium Russian text numbers -- "3353" and "3354" with a numeric message.  Meanwhile it displays to the user Russian text that translates to "Wait, seeking access to video library..."

What's more, as Mr. Oberheimer aptly points out, the premium texts should only go through in Russia.  U.S. users likely won't incur toll charges from the attack.  Of course similar trojans 
could be employed in the U.S. in the near future, so beware.

Also, the user has to physically download, install, and approve the permissions on the app.  This much relies on the Russian tricksters advertising the app as a "media player".  A number of people (in Russia) reportedly 
did fall for this, completing these steps.  The final step is that the users have to open (run) the application.  Again, a number of users apparently fell for this.

Basically the only mistake Google made in this case, in terms of security, was overestimating users' ability to handle their own security policies.  Most Android users are in the U.S. and China (less than 1 percent are in Russia), so fortunately in this case a minimal number of people appear to have been affected by their membership in the security-ignorant masses.

From this information, it's clear that the threat to savvy American users (or international ones) is minimal.  Just be sure not to install strange apps.  And if you suspect that an app may not be what it purports to be, notify Google and your carrier immediately, so you can be refunded in the case of malicious activity.

Android isn't the only platform to be hit by similar schemes.  Owners of jailbroken iPhones have been hit by worms in the past -- some mere pranks, others malicious.

Thanks, Jon for the email about your analysis!



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

Malware on smartphones.....
By themaster08 on 8/12/2010 4:43:59 AM , Rating: 2
With smartphones becoming as popular as computers, it's inevitable that malware will start to find its way on these devices (that has not been hacked by the user).

I remember around 6 years ago, the first Symbian S60 virus began to appear. My friend's Nokia N-Gage got infected, and whilst the virus itself did no real damage, it was apparent it existed. It spread via bluetooth and installed without the user knowing. A simple format of the phone and memory card rid the user of the virus, but it was alarming that viruses could find their way onto our phones.

Fortunately, I've never seen another virus on the Symbian platform after many years of use (I'm not saying they don't exist, just that I've never experienced another).

The Symbian foundation has gone to many lengths to allow the platform to be as open, but as secure as possible. Every application must go through Symbian's digital signature program in order for it to work on any device.

The program is not like the App Store approval. The program only checks if the application meets certain functionality criteria, including that of security. The critera can be found here:
http://developer.symbian.org/wiki/index.php/Symbia...

If you come across an app that does not have a signature, you can easily get one from the Symbian Signed website. If the app adheres to the criteria, you will receive your app with its certificate. Very simple.

I feel Google needs to implement similar/better methods in order to maintain security. Android is taking off by storm, and it's inevitable that it will be the subject of attack. If they want to remain as being an open platform, they need to get their security senses going sky high. Having said that, closed platforms are at no less of a risk, as shown by Apple, after recent revelations of being able to jailbreak by simply visiting a website, it's quite worrying.

With nothing stopping the homebrewing community, these companies need to be on their guard.




"If you mod me down, I will become more insightful than you can possibly imagine." -- Slashdot














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki