Skip to main content

Android

Analyzing and dissecting Android applications for security defects and vulnerabilities

posted onJuly 14, 2011
by l33tdawg

In March 2011, 58 malicious applications were found in the Android Market. Before Google could remove the applications from the Android Market they were downloaded to around 260,000 devices. These applications contained Trojans hidden in pirated versions of legitimate applications. The malware DroidDream exploited a bug which was present in Android versions older than 2.2.2.

Zeus for Android steals one-time banking passwords

posted onJuly 12, 2011
by l33tdawg

Researchers have discovered a new variant of the insidious Zeus trojan that is designed to run on Google Android smartphones, security researchers have warned.

The malicious program is a new version of Zitmo, a mobile trojan application first discovered last year that stands for “Zeus in the mobile,” Derek Manky, a senior security strategist at network security firm Fortinet's FortiGuard Labs, told SCMagazineUS.com on Tuesday.

F-Secure says that Android apps are easily cloneable

posted onJune 29, 2011
by l33tdawg
Credit:

F-Secure says it has observed a number of Android apps being `repackaged' with advertisement modules added in, so generating revenue for the repackagers.

The good news for Android device users is that they get their apps for free, but, says the firm, it also shows how easy it is for hackers to clone an existing app for their own darker usage.

Spammers push cloned apps on Android Market

posted onJune 27, 2011
by l33tdawg

No stone is left unturned, no option unexplored when it comes to online spamming, and the latest approach has shown that malware authors are not the only ones who have taken advantage of the fact that Android apps are written in Java and are, therefore, easily cloned.

"We've been seeing a rash of repackaged applications posted on the official Android Market," says an F-Secure researcher. "The repackaged application has the same modules as the original, but includes an advertisement module."



Malware targets devices with custom Android versions

posted onJune 18, 2011
by l33tdawg

Recently we discovered a new Trojan in the wild, surfacing in alternative Android markets that predominately target Chinese Android users. This Trojan, which we’ve dubbed jSMSHider due to the name used inside the APK, predominantly affects devices with a custom ROM.

Custom ROMs are custom built versions of Android, which have been released by third-party groups. The manufacturer or carrier do not traditionally endorse custom ROMs. (If you do not know what a custom ROM is, and do not think you’ve downloaded a custom ROM, you are probably not affected.)

Stealthy Plankton Malware Found in Official Android Market

posted onJune 11, 2011
by l33tdawg

While continuing an Android-related research project after the discovery of the DroidKungFu and YZHCSMS malware, my research team also came across a new stealthy Android spyware in the Official Android Market. This spyware does not attempt to root Android phones but instead is designed to be stealthy by running the payload under the radar.

Run Nessus on your Android device

posted onJune 8, 2011
by l33tdawg

Tenable has released an Android application for its Nessus Vulnerability Scanner, enabling Nessus users to remotely connect to a Nessus server, launch scans and review reports from their Android devices.

“Network security isn’t a 9-5 job,” said Ron Gula, CEO of Tenable Network Security. “The ability to conduct vulnerability scans and review results anytime from anywhere is exactly what enterprise IT and security professionals expect from their software and service providers, and it’s what they need to keep their networks safe, 24/7.”