Malware descriptions

First SMS Trojan for Android

I think the title of this post speaks for itself. Trojan-SMS.AndroidOS.FakePlayer.a passes itself off as a media player application. If the user chooses to install it, this icon with the name “Movie Player” will appear in the list of applications:

The malware sends SMS messages to two premium rate numbers 3353 and 3354, with each message costing approximately $5. It does this stealthily, without requiring any confirmation from the device owner.

During installation, the user is asked to allow this application to change or delete memory card data, send SMS and read the data about the phone and phone ID. This is a huge red flag – why does a simple media player require permission to send SMS messages? – and anyone who’s paying attention during the installation process will immediately be suspicious.

This flags up an important point: when installing a new program, you really should pay attention to which services the application requests access to. Automatically permitting a new application to access every service it requests means you could end up with malicious or unwanted applications doing all sorts of things without requesting any additional confirmation. And you won’t know anything about it.

Trojan-SMS.AndroidOS.FakePlayer.a is quite a development – yet another popular mobile platform, and one with an ever increasing market share is now being targeted by the bad guys. At the moment, although anyone’s device can be infected, the Trojan only causes losses for Russian users, and as far as we can tell, it’s currently not being spread via Android Marketplace.

In the past, though, we’ve seen plenty of local problems evolve to become global ones. And when we get malware that uses a new infection vector or targets a previously untouched platform, we know that sooner or later, there will be more on the way.

First SMS Trojan for Android

Your email address will not be published.

 

Reports

The SessionManager IIS backdoor

In early 2022, we investigated an IIS backdoor called SessionManager. It has been used against NGOs, government, military and industrial organizations in Africa, South America, Asia, Europe, Russia and the Middle East.

APT ToddyCat

ToddyCat is a relatively new APT actor responsible for multiple sets of attacks against high-profile entities in Europe and Asia. Its main distinctive signs are two formerly unknown tools that we call ‘Samurai backdoor’ and ‘Ninja Trojan’.

WinDealer dealing on the side

We have discovered that malware dubbed WinDealer, spread by Chinese-speaking APT actor LuoYu, has an ability to perform intrusions through a man-on-the-side attack.

APT trends report Q1 2022

This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 2022.

Subscribe to our weekly e-mails

The hottest research right in your inbox