Crims on top of mobile game says expert

Powered by SC Magazine
 

Malware with root access a sign of the times.

A top malware researcher said cybercriminals were keeping pace with the evolution of mobile devices.

Xuxian Jiang, assistant professor at North Carolina State University in Raleigh, discovered last week the first malware to use a root exploit against Android Gingerbread, version 2.3.

The GingerMaster trojan is repackaged into legitimate applications that attempt to lure downloads in third-party stores. In one example, the app promises pictures of models.

The malware could access a multitude of functions because it could obtain root access, according to Jiang, including email, pictures and saved data.

The malware uploaded the information it stole to a remote server and connected to a command-and-control server to await additional instructions.

Previous exploits against version 2.3 were confined to specific files based on the permissions of the malicious apps that contained the malware, Jiang said.

Because GingerMaster exploits root access, the virus spreaders can create apps that do not require any permissions, making them more likely to be trusted and installed.

Other Android malware has used root exploits before, but never in the most recent version, Jiang said. That is a sure sign the criminal community has a serious mobile focus.

A Google spokesperson did not return a phone call seeking comment. But Jiang said the vulnerability that the malware takes advantage of was patched in June.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Crims on top of mobile game says expert
 
 
 
Top Stories
Earning the right to innovate
Breaking down the barriers to innovation is a long, but rewarding process, says Bank of Queensland Group CIO, Julie Bale.
 
A call for timely reporting
[Blog post] Businesses need incentives to keep customer data secure.
 
Doubts cast on Queensland's ICT Dashboard
Opposition, former Govt CIO say it can't be trusted.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Have customers that won't pay debts?
Jul 10, 2014
The ACCC and ASIC have updated their advice when it comes to collecting debts.
Carpet cleaner faces court over online testimonials
Jul 4, 2014
The ACCC has initiated proceedings against A Whistle (1979) Pty Ltd, the franchisor of Electrodry...
You can now get 15GB of free online storage using Microsoft OneDrive
Jun 25, 2014
Cloud storage has reached both the capacity and price where it's a viable alternative to local ...
Another clever trick you can perform with Xero
Jun 25, 2014
Here is another way to reach out to particular subsets of your customers using Xero.
Have a phone, tablet and laptop?
Jun 20, 2014
This new Telstra pre-paid 4G mobile hotspot might be useful if you regularly need to use fast ...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  26%
 
Application integration concerns
  3%
 
Security and compliance concerns
  29%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  23%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  5%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 835

Vote