Kaspersky Lab has uncovered a set of malicious Android applications posing as security software.
The malware is linked to the infamous Zeus Trojan, a common tool used in the theft of banking credentials. The phony security applications were first observed earlier this month, and newer versions have continued to appear, according to Kaspersky.
“On the 4th of June 2012 we found 3 APK files of ~207 kb in size each heuristically detected by our engine as HEUR:Trojan-Spy.AndroidOS.Zitmo.a,” blogged Kaspersky researcher Denis Maslennikov. “All these applications are malicious and were created to steal incoming SMS messages from infected devices. SMS messages will be uploaded to a remote server whose URL is encrypted and stored inside the body of the Trojan.”
The point of stealing incoming SMS messages is to swipe the victim’s mobile transaction authentication number (mTAN), which is used by banks to authenticate online bank transactions. When a device is infected, the SMS messages are uploaded to a remote server.
“One of the remote server domains was registered using the same fake data which was used for registering ZeuS C&Cs [command and control] servers back in 2011,” Maslennikov blogged.” And the malware’s functionality is almost the same as in old ZitMo samples [the mobile version of Zeus]. Therefore ‘Android Security Suite Premium’ = New ZitMo.”
The issue of Android malware has been a focus security researchers and attackers alike for the past year.
Last week, Sophos released its list of the five most common pieces of Android malware. The most prevalent is what the company refers to as Andr/PJApps-C, which Sophos Senior Technology Consultant Graham Cluley described as an application that has been cracked using a publicly available tool that may or may not be actually malicious.
The second most popular is BaseBridge, which uses a privilege escalation exploit to elevate its privileges and install additional malicious apps onto a victim’s device. It also uses HTTP to communicate with a central server and leaks potentially identifiable information.
On 13 June authorities in Japan arrested six men for distributing a malicious Android app through a website that hosted adult content. According to The Daily Yomiuri, the Trojan was hidden inside an application that posed as a video player.
Once opened, the malware stole the victim’s information and sent it to a remote server. The application also displayed a message demanding a payment of 99,800 yen (£805). Symantec detects the rogue application as Android.Oneclickfraud.
“While there are countless numbers of sites aimed at scamming computer users, there have only been a handful of sites designed for smartphones to date,” blogged Joji Hamada, threat analyst with Symantec Security Response. “Out of those, we are aware of at least two sites affiliated with the site operated by the arrested men, and they are up and running…. So, with the arrest of the gang operating Android.Oneclickfraud I am hopeful that their sister sites will be taken down soon, with more arrests to follow. However, at the time of writing they show no sign of letting up.”
How well do you know Internet security? Try our quiz and find out!
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…