Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - We put the eek back in Geek.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews



IObit Black Friday Sale

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Mozilla Firefox
4. Smart Defrag
5. MusicBee
6. Microsoft Visual C++ 2015-2022 Redistributable Package
7. Sergei Strelec's WinPE
8. Visual C++ Redistributable Runtimes AIO Repack
9. Wise Registry Cleaner
10. Dolby AC-3/AC-4 Installer
More >>

top reads

Star Lossless vs Lossy: When FLAC, APE, and ALAC Beat MP3 and When They Don't

Star Google Search Tricks You'll Actually Use in 2025 and Beyond

Star Fresh PC Checklist: First 12 Things to Do On a New Windows 11 Machine

Star Running AI Models Locally: What They Are, Where to Find Them, and How to Get Started

Star Deciding Between Idle State, Sleep Mode, and Shutdown: What's Best for Your PC?

Star How to Fix VMware Workstation "The Update Server Could Not Be Resolved" Error Installing VMware Tools

Star How to Remove Google Gemini from Your Phone (and Your Life)

Star Windows Bloat Removal Guide: Debloat Safely and Keep What You Need

Star Windows 11 Repair Playbook: SFC, DISM, CHKDSK Without Breaking Stuff

Star Gmail Using Your Emails and Attachments for AI Training: Here's How To Opt Out


MajorGeeks.Com » News » June 2013 » Kaspersky Labs identifies sophisticated Android trojan

Kaspersky Labs identifies sophisticated Android trojan


Posted by: Jon on 06/07/2013 12:10 PM [ comments Comments ]


Kaspersky Labs recently discovered a new highly sophisticated multi-functional Trojan, capable of the exploiting a previously unknown flaw in the Android OS which allows itself to hide from the administrators list, which renders users unable to uninstall the app.

In a blog post Roman Unuchek, a Kaspersky Lab Expert writes that the creators of Backdoor.AndroidOS.Obad.a found an error in the popular DEX2JAR software – this program is typically used by analysts to convert APK files into the more convenient Java Archive (JAR) format. This vulnerability spotted by the cybercriminals disrupts the conversion of Dalvik bytecode into Java bytecode, which eventually complicates the statistical analysis of the Trojan.

Also, the cybercriminals found an error in the Android operating system which relates to the processing of the AndroidManifest.xml file. This file exists in every Android application and is used to describe the application’s structure, define its launch parameters, etc. The malware modifies AndroidManifest.xml in such a way that it does not comply with Google standards, but is still correctly processed on a smartphone thanks to the exploitation of the identified vulnerability. All of this made it extremely difficult to run dynamic analysis on this Trojan.

The creators of Backdoor.AndroidOS.Obad.a also used yet another previously unknown error in the Android operating system. By exploiting this vulnerability, malicious applications can enjoy extended Device Administrator privileges without appearing on the list of applications which have such privileges. As a result of this, it is impossible to delete the malicious program from the smartphone after it gains extended privileges.

Finally, Backdoor.AndroidOS.Obad.a does not have an interface and works in background mode.



With the extended Device Administrator Privileges, the Trojan can block the device’s screen for up to 10 seconds. This typically happens after the device is connected to a free Wi-Fi network or Bluetooth is activated; with a connection established, the Trojan can copy itself and other malicious applications to other devices located nearby. It’s possible that this is how Backdoor.AndroidOS.Obad.a tries to prevent the user from discovering its malicious activity.

Unuchek says that “We have already informed Google about the Device Administrator vulnerability in Android."

Denis Maslennikov, a senior malware analyst at Kaspersky Lab told PC World in addition, on rooted devices, the malware tries to gain root privileges by executing the “su id” command, like gaining administrative privileges, gaining root access requires user permission.

The new Trojan program is distributed through SMS spam, but is not very widespread at the moment. According to detection statistics from Kaspersky Lab, installation attempts for Obad.a amounted to only 0.15 percent of the total number of malware infection attempts on mobile devices over a three-day period.

Maslennikov believes that other Android malware threats will adopt advanced techniques like the ones used by this malware in the future. “We think that similar techniques are going to be more widespread very soon.”


« Xbox One will require you to be online as often as every hour · Kaspersky Labs identifies sophisticated Android trojan · iOS 7 Confirmed: New Banners Up at Moscone West »




Comments
comments powered by Disqus

MajorGeeks.Com » News » June 2013 » Kaspersky Labs identifies sophisticated Android trojan

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition