Last week, a swarm of virus-packed mobile text messages were sent to random phone numbers around the globe.
The content of the SMS was intended to lure the recipient into clicking the provided link, which would serve up a Trojan MazarBOT in a malicious Android Application Package.
The deep access granted to banking Trojan MazarBOT for Android shows exactly why app development and maintenance fall far short of the sophisticated threats they are posed with, according to Jan Vidar Krey, head of development at Norwegian app security firm Promon,
Krey believes the most alarming part of the malware was not its ability to penetrate and compromise an Android device, but that the existence of this strain was not protected against since it was first identified on the Dark Web several months ago.
The malware is packaged in hyperlinked text messages, which if followed could install TOR software and introduce man-in-the-middle attacks by sending information back to a proxy server. All device operations can then be monitored, messages can be sent to premium rate numbers and two-factor authentication codes can be accessed and used to circumvent online banking protection.
Krey explained: “With the ability to connect to different networks, access different platforms and download apps from different developers, Android devices are extremely flexible in what they can do. However, they are porous to external intrusions as a result of this ease-of-access. Once malware has cracked the device’s root, it can perform a frightening number of actions.
“Unfortunately, Android security developers have failed to keep up with the threat of Android malware’s growing mutations, which, by becoming increasingly complex, have outgrown traditional means of protection: antivirus and patching. These methods serve as poorly timed reactions to a specific vulnerability, rather than a proactive step to protect the integrity of the device as a whole. Dealing with threats as they occur is crucial to ensuring adequate security for your mobile device.”
Krey advised: “While methods such as two-factor authentication can help to an extent, if the malware has been designed to target banking applications – as it is suspected MazarBOT has – there’s no second line of defence. Instead of using crutches such as antivirus or two-factor, it is vital that security is developed at the level of the application itself.
“As it stands, the responsibility for applications has been diffusely passed between Android developers, app developers and, finally, the end user. Time and again, this dynamic has been proven ineffective and a rethink of traditional means of protecting Android applications is long, long overdue.”
Are you an Android expert? Take our quiz to find out!
Trade war latest sees Beijing proposing export restrictions on some tech used to make battery…
Settlement reached after Apple was alleged to have routinely recorded private conversations after unintentional activation…
20-year old US Army solider arrested for selling and leaking sensitive customer call records stolen…
Amid intensifying competition, Apple is offering rare discounts of its latest iPhone range in mainland…
No EV fault. Tesla Cybertruck was used to deliver fireworks and gas cylinders to a…
UK competition watchdog launches Phase 1 inquiry into IBM's planned acquisition of cloud service provider…