Find a Question:
Malicious software “complex” used Android phones as platforms for deployment
The hackers behind the malicious code Backdoor.AndroidOS.Obad.a, which targets the Android smart phones, developed to exploit infected machines to spread.
The Kaspersky Labs Security revealed on malicious code in June, as a highly complex code which has the ability to execute commands remotely developers other than its ability to grant itself powers to use many of the functions of the phone.
Performance code has been developed, which take the form of a “Trojan horse”, to send a malicious URL contains code to all the registered numbers in the address list with infected phones, without the user’s knowledge, and take messages for the user fraudulently mislead are messages sent by Google.
Malicious code developed originally to collect different information from infected machines, such as wireless network address of the device, and the user’s name, phone number, and other information is sent to the command and control server.
And receive the code that called a shortcut name Obad.a orders from the command server to send text messages to specific numbers, messages, and upload files, and links to specific addresses, send a list of applications installed on the machine, collect the contact information and orders and sending files via Bluetooth.
The Kaspersky Labs in another study of the behavior of code Obad.a, it has evolved significantly as exists currently 12 different version of that code, each version is characterized by exploiting a loophole for the Android system, and the software takes in core system software which means difficult to delete infected phones.
And Kaspersky Lab company “Google” in the code, the company said “the US company did not address the gaps exploited by malicious code only version (Android 4.3) which makes all devices running earlier versions under threat”.
The activity of malicious code being restricted to Russia and neighbouring States, namely the States acceding to the Commonwealth of independent States, the prevalence of code makes it threatening danger to users in other countries around the world.
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!