Android Trojan spotted assisting click fraud

Powered by SC Magazine
 

HongTouTou causes a stir.

A new Android Trojan has been spotted, designed to both pilfer data and aid click fraud.

The Trojan, known as HongTouTou, was spotted on Chinese third-party app stores, purporting to be legitimate downloadable programs, such as mobile wallpapers.

According to F-Secure, the malicious piece of kit looks like it has so far only been distributed only in Chinese markets and may only be specific to networks in China.

Infected applications could allow the Trojan, also being referred to as ADRD and Geinimi, to enable or disable network data access.

Furthermore, data on an infected phone may be transmitted to a remote host.

"Another functionality is the possible downloading of an APK named myupdate.apk, which is saved to /sdcard/uc /folder. This is possibly for its update component," F-Secure said in a blog post.

The Trojan cannot be found on the official Google Android Market and only rogue users accessing third-party app stores will place themselves at risk.

“The assumption has to be that those behind the Trojan horse might be earning commission through the click traffic. Furthermore, of course, it could hurt you in your pocket by eating up data bandwidth,” said Graham Cluley, senior technology consultant at Sophos, in a blog post.

“Those who do install applications from unknown sources (known as "sideloading") do need to recognise that they might be putting their smartphone, data and potentially finances in danger.”

This article originally appeared at itpro.co.uk

Copyright © ITPro, Dennis Publishing


Android Trojan spotted assisting click fraud
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 437

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 210

Vote