Thursday 29 November 2012

TOP 5 ANDROID MALWARE IN 2011




According to research conducted by Fortinet, the number of detected Android has risen by as much as 90% this year, compared to 2010.
 The Top 5 malware families for which FortiGuard Labs have received the most samples in 2011 are:
  • Geinimi: Android’s first botnet, which sends a victim’s geographic location and controls his/her phone remotely. For example, Geinimi can force the infected phone to call a given phone number.
  • Hongtoutou: A Trojan live wallpaper that steals private information such as the victim’s subscriber number (IMSI) and automatically visits Websites that the malware directs it to.
  • DroidKungFu: Another botnet that has multiple capabilities such as remotely installing other malware, remotely starting specific applications and adding bookmarks.
  • JiFake: A fake instant messenger application that sends SMS messages to premium phone numbers
  • BaseBridge: A Trojan that sends SMS messages to premium numbers
Malware such as BaseBridge was available on the Android market but was later removed. Oftentimes malicious software tries to pass itself off as a genuine application, although malware has also been found within a legitimate application they have infected.
“DroidKungFu was an example of malware that was found repackaged in a legitimate VPN utility, whereas Geinimi was found within the legitimate application ‘Sex Positions,’” said Karine de Ponteves, malware analyst at Fortinet.
Android Vulnerability
Last month, Jon Larimer and Jon Oberheide unveiled a vulnerability for Android platform 2.3.6 that revealed an easy way for hackers and malicious software developers to gain and exploit root access to an Android device.
“The mobile security trend is a familiar one: as operating systems mature and gain popularity, malware and vulnerabilities follow since there is focus and motivation from cyber criminals,” observed Derek Manky, senior security strategist at Fortinet. “With root access, hackers can gain access to system files and change system settings that are typically authored to be read only. For example, a malware creator with root access to a vulnerable device could silently download and install additional malicious software, such as ransomware, spambots and keyloggers.”

No comments:

Post a Comment

How To Hack Saved Password In Firefox ?

In my previous post i had posted two tutorials on How to hack google chrome saved password ?  and More simple way to hack google chrom...