Last week, a swarm of virus-packed mobile text messages were sent to random phone numbers around the globe.
The content of the SMS was intended to lure the recipient into clicking the provided link, which would serve up a Trojan MazarBOT in a malicious Android Application Package.
The deep access granted to banking Trojan MazarBOT for Android shows exactly why app development and maintenance fall far short of the sophisticated threats they are posed with, according to Jan Vidar Krey, head of development at Norwegian app security firm Promon,
Krey believes the most alarming part of the malware was not its ability to penetrate and compromise an Android device, but that the existence of this strain was not protected against since it was first identified on the Dark Web several months ago.
The malware is packaged in hyperlinked text messages, which if followed could install TOR software and introduce man-in-the-middle attacks by sending information back to a proxy server. All device operations can then be monitored, messages can be sent to premium rate numbers and two-factor authentication codes can be accessed and used to circumvent online banking protection.
Krey explained: “With the ability to connect to different networks, access different platforms and download apps from different developers, Android devices are extremely flexible in what they can do. However, they are porous to external intrusions as a result of this ease-of-access. Once malware has cracked the device’s root, it can perform a frightening number of actions.
“Unfortunately, Android security developers have failed to keep up with the threat of Android malware’s growing mutations, which, by becoming increasingly complex, have outgrown traditional means of protection: antivirus and patching. These methods serve as poorly timed reactions to a specific vulnerability, rather than a proactive step to protect the integrity of the device as a whole. Dealing with threats as they occur is crucial to ensuring adequate security for your mobile device.”
Krey advised: “While methods such as two-factor authentication can help to an extent, if the malware has been designed to target banking applications – as it is suspected MazarBOT has – there’s no second line of defence. Instead of using crutches such as antivirus or two-factor, it is vital that security is developed at the level of the application itself.
“As it stands, the responsibility for applications has been diffusely passed between Android developers, app developers and, finally, the end user. Time and again, this dynamic has been proven ineffective and a rethink of traditional means of protecting Android applications is long, long overdue.”
Are you an Android expert? Take our quiz to find out!
CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation
Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…
Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…
Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector
Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…
Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…