Incidents

The first Tor Trojan for Android

Virus writers of Android Trojans have traditionally used Windows malware functionality as a template. Now, yet another technique from Windows Trojans has been implemented in malware for Android: for the first time we have detected an Android Trojan that uses a domain in the .onion pseudo zone as a C&C. The Trojan uses the anonymous Tor network built on a network of proxy servers. As well as providing users with anonymity, Tor makes it possible to display ‘anonymous’ sites in the .onion domain zone that can only be accessed in Tor.

tor_backdoor_01s

Backdoor.AndroidOS.Torec.a is a variation of the popular Orbot Tor client. The cybercriminals have added their own code to the application, though the Trojan doesn’t pass itself off as Orbot – it simply uses the functionality of the client.

tor_backdoor_02s

The Trojan can receive the following commands from the C&C:

tor_backdoor_03s

  • start/stop intercepting incoming SMSs
  • start/stop theft of outgoing SMSs
  • perform a USSD request
  • send telephone data to the C&C (telephone number, country, IMEI, model, OS version)
  • send the C&C a list of apps installed on the mobile device
  • send an SMS to a number specified in a command

There are pros and cons of using Tor. On the plus side, it is impossible to shutdown the C&C. One of the main disadvantages, however, is the need for additional code. For Backdoor.AndroidOS.Torec.a to use Tor it will have required a lot more code than that required for its own functionality.

The first Tor Trojan for Android

Your email address will not be published. Required fields are marked *

 

  1. Darren Chaker

    I heard about the release of this Trojan for Android and must say this is a very concise and well written post, with great visuals too. Keep up the good work!

Reports

Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Lazarus covets COVID-19-related intelligence

As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that the Lazarus group is going after intelligence that could help these efforts by attacking entities related to COVID-19 research.

Sunburst: connecting the dots in the DNS requests

We matched private and public DNS data for the SUNBURST-malware root C2 domain with the CNAME records, to identify who was targeted for further exploitation. In total, we analyzed 1722 DNS records, leading to 1026 unique target name parts and 964 unique UIDs.

Subscribe to our weekly e-mails

The hottest research right in your inbox