“Trojan horse” extremely complex attack “Android”




“Trojan horse” extremely complex attack “Android”

Trojan horse exploits “Obad.a” Vulnerabilities undeclared to The باختراقات the extremely dangerous and very difficult to get rid of it

Revealed “Kaspersky Lab” malicious software kind of “Trojan horse” extremely complex, attacking devices operating operating system “Android”, dubbed the “Backdoor.AndroidOS.Obad.a”. A Trojan horse that the implementation of many of malicious tasks, such as sending text messages “SMS”, and download and install many of the malware, in addition to its ability to execute commands remotely.

According to an expert from “Kaspersky Lab” the Trojan horse “Obad.a” is similar in style to do malicious software for the operating system “Windows”, and that more than a Trojan horse special system Android, because it exploits a number of security holes undeclared and that are highly complex.

According to the company’s report, the “Obad.a” fabricating File Error “DEX2JAR”, which is part of a program that specializes in converting files “APK” to the file “JAR”, and because of this error becomes to do with statistics and analysis of the “Obad.a” very difficult.

Moreover, the “Obad.a” to exploit a vulnerability in the operating system “Android”, which assisted in obtaining on administrative سماحيات make delete malicious applications of the device is very difficult. It also works in the background and does not have any visual interface.

According to the “Kaspersky Lab”, when attacking “Obad.a” device, it shall promptly attempts to get Asamahiat management that you can then turn off the screen of the device for 10 seconds, the connection which device networks “Wi-Fi” unsafe available in the neighborhood or through “Bluetooth” and sends the malicious files to the devices discovered in the vicinity. It also exploits “Obad.a” command “su id” for the powers of the system administrator.

The “Obad.a” then collect various information about the device, such as a wireless network address of the device, and the user name, phone number, and other information is sent to the command and control server its own. It also receives “Obad.a” turn commands from the server to the sending of text messages to specific numbers, and delete messages, as well as upload files, and contact addresses specific, send a list of applications that have been installed on the device, and collect contact information, and carry out the orders and send files via ” Bluetooth. ”

Experts say that the complex malware that appeared newly index is expected to increase in the numbers of such software in the future.


Tags: , ,

In: Technology & Gadgets Asked By: [15519 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »