Massive Android Mobile Botnet Hijacking SMS Data 117
wiredmikey writes "A mobile botnet called MisoSMS is wreaking havoc on the Android platform, stealing personal SMS messages and exfiltrating them to attackers in China. Researchers at FireEye lifted the curtain off the threat on Monday, describing MisoSMS as 'one of the largest advanced mobile botnets to date' and warning that it is being used in more than 60 spyware campaigns. FireEye tracked the infections to Android devices in Korea and noted that the attackers are logging into command-and-controls in from Korea and mainland China, among other locations, to periodically read the stolen SMS messages. FireEye's research team discovered a total of 64 mobile botnet campaigns in the MisoSMS malware family and a command-and-control that comprises more than 450 unique malicious e-mail accounts."
LOL WTF LMFAO (Score:2)
Re:LOL WTF LMFAO (Score:4, Interesting)
Put it on some dodgy mobile cracked app site and have it perform some trivial functionsfunctions, post about it in a conspiratorial tone in some forums and watch the cheap bastards come rolling in. There are a million cheapskates for every real customer of android apps.
Re: (Score:2)
The same can be said for pre-made botnet command & control client software...
Re: (Score:1)
who knows, new category of porn soon:
"Click here to see sexy conversations between %person you want% and %other person you fantasize% online, for only $5/monthly and receive a free android device on booking for 5 years!"
Luminaria (Score:2)
Seriously, what is the "trickery" that gets one to download and install this "Google Vx" application
Flashlight App.
Re: (Score:2)
Re: (Score:2)
Seriously, what is the "trickery" that gets one to download and install this "Google Vx" application, and how many Chinese people does it take to read our LOLs? Is someone out there texting their social security number or bank PIN?
The fact that almost nobody in China can get to Google Play without trickery?
Re: (Score:2)
There is a reason Mozilla is hard with the requirements to name a build for Firefox codebase "Firefox", it is their trademark, if you build Firefox and replace Mozilla addons "store" with one that doesn't do reviews (manual or automated) and is filled with malware, I am pretty sure Mozilla will make you use another name. Android is trademarked by Google, Amazon don't call their tablets Android, because they can't. Google is to light allowing forkers to call it Android, tainting their brand
Re: (Score:2)
Google is to light allowing forkers to call it Android, tainting their brand
Well, if they didn't half the marketshare of "Android" would be going to "others".
Re: (Score:2)
Seriously, what is the "trickery" that gets one to download and install this "Google Vx" application, and how many Chinese people does it take to read our LOLs? Is someone out there texting their social security number or bank PIN?
The fact that almost nobody in China can get to Google Play without trickery?
Don't get me wrong. I love android, but even Google Play has crappy asian malware. I wish they would clean that shat up.
Search for a game or something and you get...
LOVE BLOND KITCHEN See girl beautiful aprons...
And 12 other similar apps from the same creepy ass developer...No way would someone with half a brain download that. Even worse, it wastes space in the search results, the results aren't relevant to what was searched, and it also wastes the end user's bandwidth in having do download the
Re: (Score:3)
Google needs to start tiering their store. One tier is stuff actively moderated with strict, Draconian guidelines and perhaps additional fees to support this degree of moderation. This tier would be similar to Amazon's, Microsoft's, or Amazon's store and if an app doesn't toe the line perfectly, it gets pulled without mercy (since it can easily be offered on the "free for all" tier.) The second tier would be what their store is now -- pay a fee for an account, upload, and go from there.
The next step is b
Re: (Score:1)
This way, the average Joe who doesn't know or doesn't care about permissions is kept safe from potentially malicious software by only being in the actively moderated tier, but someone who has some sort of a clue can turn that protection off and go for whatever utility they want.
Fuck the Average Joe.
He is getting stupider and less capable of caring for himself every year. I for one am tired of this pathetic leech screwing shit up for the rest of us.
Fuck Average Joe and all those that support his continued existence.
Re: (Score:2)
I think we all feel that way. However, the average Joe is the one with the money, and keeping him relatively safe is a boon for everyone in the Android ecosystem.
The other answer is to have a locked down platform like iOS where nobody can see a true "#" prompt or know what is going on in the device. Given a choice between a walled garden with no way out, versus one that has walls with a switch to flip to drop the walls as one's will, I'll take the latter.
Re: (Score:3)
Re: (Score:3)
Google needs to start tiering their store. One tier is stuff actively moderated with strict, Draconian guidelines and perhaps additional fees to support this degree of moderation. This tier would be similar to Amazon's, Microsoft's, or Amazon's store and if an app doesn't toe the line perfectly, it gets pulled without mercy (since it can easily be offered on the "free for all" tier.) The second tier would be what their store is now -- pay a fee for an account, upload, and go from there.
The next step is by default, have Android devices download only from the restricted tier of the Google Play Store, and a checkbox, similar to the one that allows sideloading, for using the open tier of their market. This way, the average Joe who doesn't know or doesn't care about permissions is kept safe from potentially malicious software by only being in the actively moderated tier, but someone who has some sort of a clue can turn that protection off and go for whatever utility they want.
Of course, there is worse in the way of markets. AFIAK, China has no access to the Google Play store, and Chinese app stores may have absolutely zero curation or moderation in place whatsoever, so there may be numerous copies of a perfectly legit app, except only one doesn't bring with it an added payload. To boot, number of downloads isn't a good statistic if bogus store accounts are easily created.
The Play store is wiped of malware on a pretty regular basis, but there are still a lot of pointless/crappy apps in there. Any true malware capable apps are swiftly removed from the store and from users devices. Your second point is exactly right though; China and other non-western areas don't get the Play store like NA/EUR does. Specifically Google cant collect/disseminate charges from the Play store there, so no developers are interested in making anything but free crApps for it. This means that even
Re: (Score:3)
Theres a simple solution to stop this. (Score:1)
Google, i dare you, i really dare you, make android by default, whitelist countries IP addresses.
So that I can choose, EU only, or Asia only, except china/korea. Or USA only ip addresses.
Yeah its drastic, but 99% of users wont access websites outside usa, or their home country or two.
But france is as bad, I know no one there or use their websites, so should block the whole country on my linux server...
Is there any easy to use firewall configs to block/allow by country?
depends. netfilter just like any other Linux (Score:2)
> Is there any easy to use firewall configs to block/allow by country?
That very much depends on your definition of easy.
Netfilter is there. Some phones have iptables pre-installed, so on those phones you'd blacklist or whitelist list exactly the same as any other Linux distribution. That's easy for me, it would be hard for a lot of people.
Other phones don't have iptables installed so you'd need to copy the binary over to the phone.
At minimum, you'll need root access on the device.
Re: (Score:2)
Google, i dare you, i really dare you, make android by default, whitelist countries IP addresses. So that I can choose, EU only, or Asia only, except china/korea. Or USA only ip addresses. Yeah its drastic, but 99% of users wont access websites outside usa, or their home country or two.
Do you have citations or experience to back that claim up? I live in Illinois, my web site is in Canada. I had a pretty popular Quake site from 1998 to 2003 that used the same host as I'm using now. My traffic came from all o
Re: (Score:3, Interesting)
I think you are missing the more important information here, malware like this and Linux servers being targeted for attack [arstechnica.com] finally drive a stake through the lie that just because you have source that magically makes it more secure. As we see its just as many of us have been saying for years that once Linux reached a level of popularity it too would fall, no different than windows and OSX.
All having the source does is make it so that 1.- if you have the money, or 2.- if you have the coding talent, that you can continue to have that older piece of hardware or software supported...that's it, that's all it does, it keeps you from ending up with software or hardware being unsupported because everybody moved on because you can pay to keep it going or fix it yourself. I mean if anybody even thought about it for more than 30 seconds it would be plain as the nose on your face why "many eyes" is a myth, how many tens of millions of loc is in your average distro? How many programs and/or components are updated/upgraded on that distro per quarter? This is why every bug tracker has bugs going back several years, for the vast majority of any distro I seriously doubt anybody other than the guys that actually work on the project look at it with any regularity and you can be damned sure the majority of it isn't getting a security audit, it simply changes too fast.
But of course I'll be modded off the page for daring to point out what TFA clearly shows, but IRL Linux is just as complex as any other modern OS and where there is complexity there is flaws, simple as that.
Linux vulnerabilities have nothing to do with this, since users are willingly installing the apps and granting them permission to do these things (whether there is a better way of doing the aforementioned things in Android is moot since you decided to attack Linux). The one thing you missed is that when the source is open, the discovery of a vulnerability doesn't have to wait for the corporate "is it worth it to fix it" cycle. Anyone with a smidgen of coding talent can dig in and take a swing at it, which
Re: (Score:2)
Re: (Score:2)
This was my exact question. What is the infection vector? I don't care what software is installed, but how it gets there in the first place. If it's not exploiting a flaw in the OS itself, then it's just user stupidity.
Re: (Score:1)
Seriously, what is the "trickery" that gets one to download and install this "Google Vx" application, and how many Chinese people does it take to read our LOLs? Is someone out there texting their social security number or bank PIN?
Yep they are. Peeps do most everything including texting things to themselves to remember stuff. Creating draft SMS to remember, not sure if that is sent to the server but probably. /guilty - Not of sending bank data but sensitive url's /shamed
MisoSMS (Score:1)
The problem is with dumb users out there who just do not read the type of permissions required by apps they download versus the functionalities that it is supposed to give, that also without reading reviews and comments about it, su
Re:MisoSMS (Score:5, Insightful)
The bigger problem is the really poor security options available on Android apps with somewhat ridiculously broad security rights. Most apps will ask to read phone identity simply because the need to be able to identify the device on which the app is installed, but the security grant for phone identity gives a whole crapload more than that. Manage accounts is another good one where in order for an app to actually store its own accounts it needs access to all the accounts.
Add to that the fact that Google themselves have been constantly trying to take over your SMS with bloody Hangouts and it's not really that surprising that folks don't really understand the permissions they are granting.
Re: (Score:1)
The problem is that there is really no shame in exploiting the user anymore. This has led to the situation where users routinely have to give permissions that are not related to the primary function of an app, simply to enable the app monetization. The difference between a truly hostile app and ad-supported apps is only a nuance.
Re:MisoSMS (Score:5, Informative)
Re:Mf-droidisoSMS (Score:5, Informative)
> No kidding. I had to look through dozens of "flashlight" apps
> to find one that didn't want my calendar, SMS, internet access,
> and GPS.
F-Droid [f-droid.org] is your friend.
As always, FOSS means you don't have to put up with the bullshit.
F-Droid build all apps they ship from source, including some sort
of grep filter on permissions to catch (and then remove) any code
which is not in the user's best interest, or at minimum flag and
explain the issue in detail to let you decide for yourself.
Otherwise-good apps with flagrant ad-ware or cripple-ware in it
simply gets patched.
F-Droid has limits in some categories (Score:4, Insightful)
Re: (Score:3)
Humble Bundle is a great source of games where you can pay what you want. If you really can't afford very much, it's perfect for you. If you like supporting cross-platform games, charities like the EFF, and the developers that write the games, it's also perfect for you. They actually have a decent number of games for Linux as well for those who are interested.
Android: death by a thousand peeping toms (Score:4, Insightful)
The Android permission system blows goats. It's not just the "all or nothing" approach to app acceptance. It runs deeper. It's also the app store itself, where I can't restrict (or prioritize) search results based on permissions demanded.
Using aSpotCat, under android.permission-group.PERSONAL_INFO I've got AdService, Chrome, Firefox, Gmail, Google Play, Pebble, and RunKeeper. I've had to bail on the installation of close to fifty apps to keep this list this short.
Basically the Android security model deters me from actually installing software, to the point where I no longer regard it as a platform.
This xmas between an Android tablet and an eReader, I'm likely to get an eReader (Kobo here in Canada), which is not a platform either, and doesn't play one on TV.
I was reading reviews that commented that a Kobo Aura is about the price of a servicable, entry level tablet from Walmart. Several of the reviewers commented "you might as well get the full Android platform for the price". What platform? Android is mainly a platform for sharing far more about myself than I wish to divulge with strangers I don't even know. Whatever information is gleaned will never be under my control ever again: it will almost certainly be amalgamated from one low-life to another ad nausium.
I'd be quite happy if not a single vendor knew my location ever, who wasn't providing me with a map for my own purposes (such as RunKeeper). If they need to know, I'll tell them. Yet 90% of Android applications demand to hoover this up and the Google play store provides no mechanism to put these applications on a personal shit list, so that better-behaved applications float to the top of the candidate list.
Android: Death by a thousand peeping toms. Where's well-behaved Waldo? Crushed by the throng. Eventually Diogenes tires of visiting the Turkish baazar and begins to subsist on juniper berries.
Re: (Score:2)
Re: (Score:1)
Had you gotten that, um, other popular smartphone, the flashlight function would be built in, right on the popup control panel.
You mean the most popular smartphone, a samsung-branded android-powered galaxy device? Yep, you are right, those phones have it built right in to the panel (even before iOS copied it for the iPhone). He sure should have; hell, he probably did, but he is just trolling. We don't troll like that though, do we?
Re:MisoSMS (Score:4, Informative)
A million times this. Android's permission model is deeply flawed. You have to either accept or deny *all* that an app requests in its manifest, or you can't install.
So as a developer, sure you could add a setting to your app's config pages to, say, turn of location services -- but the app still has that privilege. nothing for it but uninstalling.
Re: (Score:2)
No. Not a million times this. To get this stupid app on your device you have to deliberately go out of your way to enable sideloading, download the app when promted from some dodgy website, install it, grant it admin.
This has nothing to do with the Android permissions system and everything to do with dumb people. Actually REALLY dumb becaus they chose to enable sideloading, they are going out of their way to be hacked... the "Google Vx" settings app isn't pinging up in the Top 10's in the app store, it's si
Re: (Score:3)
Sorry, but the post I replied to was about Android's poor permission model. You're right that this particular nasty would still bite a lot of people in the ass -- due to their own carelessness -- even with a less crappy permission system. That much is not disputed, there is no easy fix for stupid.
The argument of GGP, as I read it at least, is basically saying that even bona fide devs and clever users are stuck with this all-or-nothing approach to granting privileges.
Re: (Score:1)
In China, phones do not have Google Play installed. You can't use it. Period. How many times do you have to be told before that fact sinks in?
Re: (Score:2)
it could ask every fucking time it does something too, like j2me security model as implemented on phones did. want to write a file, a single file with filesystem api? that's 3-4 security questions each with two button presses.
too bad they didn't think of the middle ground option. you know, too many screens to designs and committees to attend if doing that(also this is why the official mobile java failed and android emerged as the victor)...
Re: (Score:2)
I've actually considered releasing two versions of my app to allow people this fine grained control. There's some really neat features I could add by adding location services but I am conscious that there are some people who would balk at that. If it was an "optional" setting, it would be a no-brainer.
Re: (Score:2)
I don't know why Android Security Model doesn't include the option for apps to request trading features for permissions. If you want to use cool feature X it needs location services. Or Feature Y needs access to your SMS/Contacts. If you don't enable X or Y, those features are not available.
Re: (Score:2)
Ha ha. Yeah, I don't want to use the "advertising features" of my free app, so let's chop-off all the spyware permissions.
Re: (Score:1)
And to add on top of that the user is presented with two choices: Either install the app and grant all the requested permissions, or don't install the app.
Not even an obviously malicious permission request will stop most users from installing (cf: flashlight app [bbc.co.uk], Why does this need data? I don't care. *click*). My guess is that this happens because at this point the user has already made the decision (I've just clicked on 'Install'!).
Google treats this as works as intended/wontfix [eff.org], so don't expect any chang
Re: (Score:2)
That said, Android has some shocking poor security behaviour that Google should fix. It should be possible to turn off certain permissions an app says it wants regardless of what the manifest
compare Windows - no control of application perms (Score:2)
I understand what you're saying. However, compare this "ridiculously broad" system to almost anything else, such as your Windows desktop. On Windows, applications have 100% permissions to do whatever they want on your computer. The user is either admin or not admin, two choices only.
It seems to me Android's system is a giant leap forward, although it's imperfect. You have very fine grained control in Linux through SELinux. Some people might prefer that level of control, but that level of detailed control
Re: (Score:2)
Android's being infested faster than Windows ever was in the same timeframe of existence.
There are far more established malicious software developers making money than when windows first launched so I would not be surprised if that is true. Regardless of how secure your OS is once it becomes the most common consumer platform then that is where the money is, it is a target, and someone will find a way to make that money even if it is playing on the inexperience and stupidity of the average user.
Up until this point the lamp has been the biggest area where linux is used and they are usually manage
Re: (Score:1)
Re: (Score:2)
The permission system itself is flawed. There's no reason for an all-or-nothing approach. Let me install an app and deny it internet access. Please. If the app doesn't like it it can just not run. That way we can put the control in the hands of users while not having any worse security than we have now.
Re: (Score:2)
I'm not even asking for stuff like network whitelisting. That'd be nice of course, but if you want that level of control you can root your phone and stick a firewall on it and achieve that goal. I'm talking more about the fact that it'd be nice for the app to be able to identify my phone without identifying me, or to create an account without having carte blanche to all the accounts I already have, just some really basic crap so that complete strangers can't lift my telephone number.
It'd also be nice if Go
Re: (Score:3)
No, the problem is commercial "appstores" that try to mimick the original open source model for application repositories, also known as package management systems, badly.
The reason software packages on Free OSes work well is because the
Games are more often non-free (Score:2)
Point of view (Score:1, Insightful)
Heh you Android guys are funny. If that was an article about Microsoft Windows, you'd be all over the place spewing end of days stuff :))))))
What will it look like? (Score:2)
What will it look like if I ever go into one of those mobile OSes from the security standpoint compared to less mobille OSes? I haven't touched mobile OSes even remotely yet. I understand the apps ecosystem might cause problems not directly linked to the OS but still, overall?
Re:What will it look like? (Score:5, Interesting)
Well, First there's Linux. Which is fine, except it's out of date, and thus can be compromised trivially. Then there's the device drivers which frequently have exploits due to the rapid progression of mobile platforms, being built by the lowest bidder, and the lack of consumer desire to pay a premium for security.
At this point we interact with the other small separate OS for the cellular radio -- It doesn't really validate inputs well and can be compromised trivially.
Moving on, we have an excellent application of user / group privileges which constrict application. Really would love actually a bit more than the level of control this has on desktops; Eg: Firefox runs as its own user on my desktop system and the Firefox user has access to its settings folder and is in the "Internet" group, so it can access the web. "sudo" is nice, but we need such a thing for granting user-level access to user-agents such as Firefox; It's one reason I'm developing an Agent Oriented OS and programming language... Anyhow, since the granularity is utterly shite it's basically pointless on mobile systems.
Then we have the Application. Note, this is not plural. We have the Davlik VM aka Java, but register based (faster, more memory use) instead of stack based (slower, less RAM use). There's some great stuff in the install process here whereby linkage occurs and the byte orders of values in the images are translated to machine order. Prior to running on Android the complied Java bytecode is translated into Davlik bytecode -- Unfortunately, there is no copy of this bytecode kept around in case you want to copy it to another device. I'm a firm believer of link on install, but they've done it horribly wrong: My OS links programs on install into MACHINE CODE... ugh. This is mobile so, yeah, let's use what little CPU we got to run a VM -- er, a just in time compiler for a VM.
Now, on desktop systems such as 80486, you'll have up to 4 different execution permission rings to leverage, but on the ARM and other systems you get 2: Kernel or Not. This really messes up the fact that you are running a VM atop a kernel. Well, Linux moronically doesn't reserve a ring level for applications to use against their plugins the same way the kernel isolates itself from user-land applications, so the hardware makers have adopted the monolithic kernel approach. Hey, guess what? We're running a monolithic VM atop a monolithic kernel! Yay! It's like Exploit HEAVEN! Remember how in 16 bit DOSs your program could access any other "TSR" program's memory, or even the OS / BIOS itself and wreak havok? Oh, man. It was great! Mobile has brought this back!
Then we have the app ecosystem, which is actually the strong point IMO. It at least gives you a chance to let other suckers become victims of an exploit and hope it gets pulled / blacklisted from the markets before you try it out. Also, 64GB micro SD's exist now... but a lot of new devices don't have SD card slots, so fuck 'em.
Finally we have the Carriers. They dig down deep into the nether regions of shit that shain't be shat around with, and do just that to create the UI's and app launchers high atop the software stack. Noticeably, desktop OSs have less overhead for doing things than the mobile methodology, but that's the sacrifice you make to have idiots develop you tech on the cheap.
Re: (Score:1)
Are they willing to pay more for security? They are willing to pay their normal cell phone contract amount and $200 for a high end phone.
How many people would pay for security software for their phone?
Re: (Score:2)
No phone calls?
Re: (Score:2)
Do not do anything on a cellular phone that you would not do on a public computer in the library. Treat them as you would a public phone.
That should tell you everything you need to know about the "security".
You must be one of those 'optimists' I've read about. A public phone isn't strongly correlated with you, personally, nor does it provide much in the way of real time location data (aside from the 'well, he must have been in the phone booth when he made that call' data point). Plus, you can still get computers without cameras and microphones...
FUD? (Score:3, Insightful)
For all the exaggerated scary words used like "one of the largest", "more than 60 campaigns" etc, there was not a single solid data point about the actual devices infected. Not even a ball park number - like whether it is tens, thousands or millions of devices.
Makes me suspect the claims.
Was it on the Play Store? (Score:2)
I can't find any information about where this was downloaded from. It's not on the Play Store (or at least, not anymore), so where were people downloading it from?
And the moral here is (Score:5, Insightful)
Re: (Score:2, Insightful)
When was the last "Massive iOS Mobile Botnet Hijacking SMS Data" headline?
When was the last maximum security prisoner getting run over by a bus headline? Sometimes freedom has its own risks, which includes idiots making poor decisions over where to get their software from. Does that mean everyone should be locked up in a cage to prevent that from happening?
Re: (Score:1)
When was the last "Massive iOS Mobile Botnet Hijacking SMS Data" headline?
When was the last maximum security prisoner getting run over by a bus headline? Sometimes freedom has its own risks, which includes idiots making poor decisions over where to get their software from. Does that mean everyone should be locked up in a cage to prevent that from happening?
No, not at all, but there are parts of this story that expose one of the weaknesses of the Android permissions model; namely that an app requests a set of permissions (that are overly broad to cut down on the number of permissions groups) and you have to either accept or deny those permissions wholesale. This affects apps from all sources, even reputable ones. On that front, the iOS model is better - it asks for permissions as the app requests them, so you can accept/block an app on a granular basis. So you
Re: (Score:2)
That said I think it is vital that Android should allow me to withhol
Re: (Score:2)
When was the last "Massive iOS Mobile Botnet Hijacking SMS Data" headline?
When was the last maximum security prisoner getting run over by a bus headline? Sometimes freedom has its own risks, which includes idiots making poor decisions over where to get their software from. Does that mean everyone should be locked up in a cage to prevent that from happening?
No, not at all, but there are parts of this story that expose one of the weaknesses of the Android permissions model; namely that an app requests a set of permissions (that are overly broad to cut down on the number of permissions groups) and you have to either accept or deny those permissions wholesale.
Because the people who download dodgy apps and sideload them, then click past the permissions list without even looking at it would selectively disable the permissions they didn't really want to grant?
The permissions problem you refer to is a really difficult one to solve. Oh, it could be solved for you, by giving you the ability to selectively disable permissions (which, BTW, you can actually do with a small amount of one-time effort), but face it, less than 1% of Android users would carefully vet and in
Re: (Score:2)
Re: (Score:2)
This "arm race" wouldn't ever occur. Apple and MS are considerably more hostile towards developers and the developers just accept it. Making the OS, Hardware and Store owner mad at you is not a recipe for success if you want to be an app developer.
I suppose Google could institute a policy of banning apps that try to circumvent ad-hoc user permission restrictions. Yeah, that would cut the arms race off at the knees. Good point.
Re: (Score:2)
Re: (Score:2)
Interesting (and well-stated) points.
However, I don't think allowing users to control individual permissions will fix it. Users will just continue authorizing the kitchen sink. If some of them start exercising more control over specific permissions, app developers will simply respond by refusing to show the dancing pigs if SMS isn't actually working.
And I don't think shutting off the APIs entirely is an acceptable solution, even if it arguably works for Apple.
Re: (Score:2)
With this in mind, on iOS, there's no API to get at the SMS directly - you need to rely on OS flaws to do it. Even sending an SMS requires switching to the iMessages app - no app can send an SMS directly unless they implement SMS functionality within themselves (which means they can't use the cell network SMS facilities).
Conversely, Android does allow 3rd party apps to swap out core parts of the experience and it has lead to some highly innovative products. Apps like Viber integrate VOIP into the standard dialler. There are countless SMS apps which add stuff like emoticons & IM functionality (even Google Hangouts is one). There are numerous desktop replacements, many which provide a modern launcher to older devices, or augment the experience in interesting ways.
Yes there is malware lurking around on the fringes, but t
Re: (Score:2)
Re: (Score:1)
What store in the most populous country? (Score:2)
Re: (Score:3)
Advertisers and junk apps on legitimate sites are now common vectors for these trojan horses.
I can't go to Download.com anymore because there's no real way to tell the difference between; "click here to download your file" and "click here to download your file" from an ad unless you closely examine the link -- though the only difference is usually a hashed code from the same download location. They look exactly the same, but the other will download an installer to put spam on your machine and it turn it int
Am I missing something? (Score:2)
Two-factor authentication (Score:2)
Exfiltrating???? (Score:1)
Android malware FUD © (Score:2)
This is BS, how does this malware get on to the device in the first place, does it require user action or can it install silently and root the device.
Sprint? (Score:1)
the attackers are logging into command-and-controls in from Korea and mainland China, among other locations, to periodically read the stolen SMS messages.
Rumor has it that they are paying James Earl Jones and Malcom McDowell to read those stolen SMS messages out loud.
Re: (Score:2)
.
http://selinuxproject.org/page/SEAndroid [selinuxproject.org]
"Security Enhancements for Android (SE for Android) is a project to identify and address critical gaps in the security of Android. Initially, the project is enabling the use of SELinux in Android in order to limit the damage that can be done by flawed or malicious apps and in order to enforce separation guarantees between apps. However, the scope of the project is not limited to SELinux."
In f
If you are so worried (Score:1)
Re: (Score:2)
An amazing leap there eh?
It also seems you're pretty far off the mark. As people read the articles, they discovered there's much about how the botnet works and not so much about how the infection gets in there except to say "the malware pretends to be something useful" or in other words, as a trojan horse.
And the short concensus of it is "if you're stupid enough to install these sketchy apps, you deserve what's coming to you." That said, the articles never exactly stated how wide spread this is. I suspec