![]() ![]() Creators of Android.Xiny hid the malicious software inside PNG images to avoid being detected. Besides these trojans, Bitdefender Labs also identified the TeaBot (also known as Anatsa) banking trojan being downloaded as a payload by Android/FakeAdBlocker. Steganography is essentially the art of deception, in this case it implies hiding data covertly in plain sight, particularly inside images. Security experts have also noted the use of steganography that hackers used to pull off this stint. The malware operator would then tell the Trojan to display ads on a user's screen or further escalate the problem on the device by downloading other malicious apps. ![]() ![]() Once the Trojan collected all this information, all the data collected was sent to the C&C server based on the infected phone's specifications. Moreover, it could even detect from what app the Trojan was able to all this information. The malicious Trojan gathered sensitive user details such as IMEI identifiers, mobile network information, a phone's MAC address, the OS version and the kind of memory card the phone uses. Users who downloaded any of these infected games had their personal information compromised after which it was sent to a remote C&C (command and control) server. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |