Thursday, July 18, 2013

Symantec warns - hackers remodeling Android and ... - Techworld

Symantec reports that there are new tools that allow cybercriminals to replace the usual Android on the Trojans. These are tools that use open source software AndroRAT (providing remote access), allowing a remote hacker to take control of an infected machine.

 /> Read also:
  • Microsoft has discovered a Trojan that hides in a sophisticated manner downloaded their files
  • Trojan created by … 11-year-old
  • First Android malware attacking PCs

Developers malware traced back more often the solution exploits existing programs to protect your Android device. These include tools able to rebuild a sneaky way popular Android apps and put them Trojans.

One such tool is called AndroRat APK Binder. According to Symantec, the criminal forums this tool you can buy for about $ 40. As the name suggests, it was built on a commercially available software RAT (Remote Administration Tool). Using software AndroRat APK Binder, a remote malicious takes control of an infected machine using a standard user-friendly control panel. For example, a hacker can then make phone calls and send text messages, read the parameters GPS, activate the camera and microphone and read files stored in the mobile device.

See also:

  • Intel will optimize Core for Android
  • Oracle released a fix pack in July Critical Patch Update
  • Carberp – a dangerous pest leaked code

RAT attack method takes the form of a package APK (Android App Package). Used in conjunction with Binder AndroRAT APK allows even less experienced hacker to develop a method to automatically infect standard Android AndroRAT malicious code, thus turning them into Trojans. When unaware of anything you install on your device, the app installs with her AndroRAT software.

Symantec announces that it has already identified 23 popular applications for Android, where hackers zagnie?dzili AndroRAT malware, or trojans. The company does not say application name or date when it happened. Observe, however, that discovered it, the new method of attacking Android devices can evolve and transform over time in a more sophisticated way to take control over mobile devices is controlled by the operating system.

No comments:

Post a Comment