The Latest in IT Security

These Aren’t the Droid Updates You’re Looking For

24
Oct
2011

Our Threat Solutions team discovered an interesting threat using a novel “infection vector” for Android today.

Back in July, they analyzed Spyware:Android/SndApps, which, after an update, is able access various bits of personal information. Before the update, it only requests the “Internet” permission. It seems probable to us that users are less likely to carefully review permissions for an update of an application that is already installed on their smartphone.

So… with this permission escalation via an update method in mind, the team been monitoring for malicious applications attempting the same trick. And today… they found one.

Analysis is currently underway.

What we can currently tell you is that the original application (downloaded from a third-party market) is free of malicious code. Once installed, the application immediately informs the users that an update is available — and that “update” — installs a variant of Trojan:Android/DroidKungFu.

There’s still some question as to whether the original application developer actually intends for their application to be a used as a DroidKungFu downloader. Possibly, the developer’s back end has been compromised.

We detect the applications as Trojan-Downloader:Android/DroidKungFu.E and Trojan:Android/DroidKungFu.C.

SHA-1: 5e2fb0bef9048f56e461c746b6a644762f0b0b54

We’ll have additional technical details and screenshots on this “update attack” in a subsequent post.

Leave a reply


Categories

TUESDAY, MAY 21, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments