Skip to main content

This Android Malware Will Install A Trojan Onto Your PC And Record You Through Your Microphone


There’s a new type of Android malware out there that is masking itself as a “cleaner” app, but what it’s really doing is infecting both your smartphone and your PC. Kaspersky researchers discovered the “cleaner” apps, called Superclean and DroidCleaner, in the Google Play store which makes it all the more scarier. The apps are supposed to free up memory in Android, but instead does an extensive feature set of other harmful things. Here’s a list:
  • Sends SMS messages
  • Enables WiFi
  • Gathers information from the device
  • Opens random links in the browser
  • Uploads the entire content of your SD card
  • Uploads arbitrary files and folders to the master’s server
  • Uploads all of your SMS messages
  • Deletes all of your SMS messages
  • Uploads all of your contacts, photos, and coordinates to the master
Once the “cleaner” app is installed and running, it begins listing processes on your device and restarts them in the foreground to make it appear as if it’s really “cleaning” your device. However, in the background, the app downloads three files (autorun.inf, folder.ico, and svchosts.exe) to the root of your SD card.
When you connect your smartphone to your Windows computer, the SVhosts.exe file (Backdoor.MSIL.Ssucl.a) will automatically execute itself onto your PC. It then takes control of your microphone and records you. It encrypts those recordings and sends them back to the master.
Kaspersky released a statement on how the malware creators are expecting this threat to spread:
Generally speaking, saving autorun.inf and a PE file to a flash drive is one of the most unsophisticated ways of distributing malware. At the same time, doing this using a smartphone and then waiting for the smartphone to connect to a PC is a completely new attack vector. In the current versions of Microsoft Windows, the AutoRun feature is disabled by default for external drives; however, not all users have migrated to modern operating systems. It is those users who use outdated OS versions that are targeted by this attack vector.
Thus, a typical attack victim is the owner of an inexpensive Android smartphone who connects his or her smartphone to a PC from time to time, for example, to change the music files on the device. Judging by the sales statistics for Android smartphones, I would say that such people are quite numerous. For the attack to be more successful, it only lacks a broader distribution scheme.
There’s still no word on how many actual apps like this one are out there, so the best thing to do at the moment is just stick to apps that have a high number of downloads/comments and also apps from trusted developers.
This is the first time Kaspersky has discovered a mobile malware with such an extensive feature set.
Have you been hit by an Android malware before?

Comments

Popular posts from this blog

IoT’s Biggest Challenges : Privacy and Security

E verything today from your mobile to refrigerators to cars are interconnected, which made our life easier. This device collectively called IoT. But they have also created new vulnerabilities for hackers. IoT devices are poised to pervasive in our lives than mobile phones and they have access to sensitive personal data may be your credit card number, banking information and many more. As number of IoT devices constantly increase, security risk also increases. Device manufacture’s doesn't care much regarding device security and consumer have to suffer may he can be hacked and there may be severe consequences. A single security concerns on single device can cause multiple concerns when considering multiple IoT devices interconnected together. IoT devices use some form of cloud service and a mobile application use to access and control device remotely. So it’s very important to understand security risk. Current Scenario : Security Risks Privacy Concerns Many devices co...

Internet of Threats!

T he Internet of Things (IoT) is continuing to gain traction with an ever-increasing number of connected devices coming to market. But as tech-savvy consumers begin investing in their first devices for a connected home, what is to stop them becoming a cyber attacker's next target? While still uncommon, we know that cyber attackers are going after connected consumer devices, demonstrated on a massive scale by the group of Russian hackers who published thousands of live-streaming webcam footage from over 250 countries. Unless the manufacturers of connected devices take a holistic approach to bolstering their cyber security efforts, these types of attacks will increase in number. To gain a greater understanding of the cyber security risks that consumers could be exposing themselves to, research was conducted into the cyber security posture of six ‘always-on’ consumer IoT devices. The results were unsettling. Veracode carried out a set of uniform tests across all the...

Beginning of Hacking

Before Hollywood took the hacking phenomena under its wing, unless you were a clued-in techy, the world of hacking would be unfamiliar territory. In recent years, movies like The Girl with the Dragon Tattoo, The Matrix and The Italian Job have managed to glamourize the high-tech thrill of breaking into servers, cracking door codes and hijacking security networks. But before television brought the hacker technology into our general knowing, hacking was still an occurring reality for some. So what is the history of hacking and where did today's sophisticated hacking begin? Late 1950s – The MIT Start Off with a Bang Hacking wasn’t always about computers. In fact, the first ‘hackers’ were roof and tunnel hackers, which the Massachusetts Institute of Technology was instrumental in introducing. These were people who entered roof and utility tunnel spaces without authorization, in other words getting into a place they shouldn’t be in – which is where computer hacking go...