Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Network Security Viruses & Malware Hackers Security Solutions More Topics...
Barium Ferrite (BaFe):
Higher Capacity, Superior
Performance, Longer Archival Life

www.thefutureoftape.com
Wireless Security
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Researchers Find New Google, iPhone Malware
Researchers Find New Google, iPhone Malware

By Jennifer LeClaire
July 9, 2012 2:45PM

Bookmark and Share
Kaspersky Lab said MegaFon, a major mobile carrier in Russia, contacted the security firm about a suspicious application found in both the Apple App Store and Google Play. The firm's analysis of the iOS and Android versions of the same application showed that it's not an SMS worm but a Trojan that uploads a user's phonebook to a remote server.
 


Less than a week ago, a Microsoft researcher called out a botnet that was hijacking Android phones and sending spam e-mails. Now, a mobile security company has identified a new virus targeting China's largest mobile apps market.

TrustGo Mobile said the virus Trojan!MMarketPay.A@Android is targeting China Mobiles' Mobile Market. With more than 600 million users, China Mobile is one of the largest wireless providers in the world. The virus automatically places orders and downloads paid apps and video content, driving up its victims' phone bills.

Since the Trojan!MMarketPay.A@Android malware was discovered on July 4, the virus has been found in nine additional China Android markets and has infected more than 100,000 devices, according to TrustGo Mobile.

Cloning Popular Apps

The majority of mobile malware is found in applications that originate from and attack third-party markets in China and Russia, the firm reports. The main source of Android-specific malware is the cloning, repackaging and modification of popular apps with intentionally malicious code.

"The ease and speed that malicious apps can be developed and distributed to unsuspecting users is one of the fastest growing security concerns," said Xuyang Li, CEO of TrustGo. "Anyone with a smartphone or mobile device is a potential target."

Neil Roiter, research director at Corero Network Security, said malicious mobile applications that covertly charge users for premium services, such as the new applications that are infecting thousands of Android devices in China, were becoming an increasing problem.

"It is essential that people download applications only from authorized Android application stores and do some research online before they download anything," Roiter said. "It's also a good idea to check your phone bill for unusual charges to ensure that that you are not paying for services that you didn't subscribe to."

Infiltrating Apple's Walled Garden

Meanwhile, Kaspersky Lab said MegaFon, a major mobile carrier in Russia, contacted the security firm about a suspicious application found in both the Apple App Store and Google Play. Kaspersky Lab expert Denis Maslennikov said it seemed to be an SMS worm spread via sending short messages to all contacts stored in a phone book with the URL to itself, at first glance.

However, the firm's analysis of the iOS and Android versions of the same application showed that it's not an SMS worm but a Trojan that uploads a user's phonebook to a remote server. Maslennikov explained in a blog post that the 'replication' part is done by the server -- SMS spam messages with the URL to the application are being sent from the remote server to all the contacts in the user's address book. The app is called "Find and Call."

"User will be able to continue using the application but at the same time the application steals data from the device (phone book and cell phone numbers) which are uploaded to a remote server to be used for SMS spam campaigns," Maslennikov wrote.

"Each phone book entry will receive SMS spam message offering to click on the URL and download this 'Find and Call' application. It is worth mentioning that the 'from' field contains the user's cell phone number. In other words, people will receive an SMS spam message from a trusted source."
 

Tell Us What You Think
Comment:

Name:

Don:

Posted: 2012-07-10 @ 2:46pm PT
Go Blackberry!!



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Wireless Security
1.   NSC Backs Disclosing Vulnerabilities
2.   McAfee Tool To Stop the Heartbleed
3.   How, Why Heartbleed Got Its Name
4.   Is Heartbleed the Biggest Threat Ever?
5.   States Probing Massive Data Breach


advertisement
McAfee Tool To Stop the Heartbleed
Firm offering it free to users.
Average Rating:
Is Heartbleed the Biggest Threat Ever?
Widespread extent puts millions at risk.
Average Rating:
States Probing Massive Data Breach
Credit giant Experian in the hot seat.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Heartbleed Could Cost Millions, Could Have Been Prevented
Early estimates of Heartbleed’s cost to enterprises are running in the millions. The reason: revoking all the SSL certificates the bug exposed will come at a very hefty price. Some say it all could have been avoided.
 
Michaels Says Nearly 3M Credit, Debit Cards Breached
Arts and crafts retail giant Michaels Stores has confirmed that a data breach at its POS terminals from May 2013 to Jan. 2014 may have exposed nearly 3 million customer credit and debit cards.
 
Google's Street View Software Unravels CAPTCHAs
The latest software Google uses for its Street View cars to read street numbers in images for Google Maps works so well that it also solves CAPTCHAs, those puzzles designed to defeat bots.
 

Enterprise Hardware Spotlight
Vaio Fit 11A Battery Danger Forces Recall by Sony
Using a Sony Vaio Fit 11A laptop? It's time to send it back to Sony. In fact, Sony is encouraging people to stop using the laptop after several reports of its Panasonic battery overheating.
 
Continued Drop in Global PC Shipments Slows
Worldwide shipments of PCs fell during the first three months of the year, but the global slump in PC demand may be easing, with a considerable slowdown from last year's drops.
 
Google Glass Finds a Home in Medical Education, Practice
The innovative headpiece may find its niche in markets where hands-free access to data can be a big advantage. Glass experiments for doctors are already under way, with some promising results.
 

Mobile Technology Spotlight
Review: Siri-Like Cortana Fills Windows Phone Gap
With the new Cortana virtual assistant, Windows catches up with Apple's iOS and Google's Android in a major way, taking some of the best parts of Apple's and Google's virtual assistants, with new tools too.
 
With Galaxy S5, Samsung Proves Less Can Be More
Samsung has produced the most formidable rival yet to the iPhone 5s: the Galaxy S5. The device is the fifth edition of the company's successful line of Galaxy S smartphones, and shows less can be more.
 
Facebook Rolls Out Potentially Intrusive Location-Sharing
Looking for friends? Facebook users in the U.S. will soon be able to see which of their friends are nearby, using a smartphone's GPS. Could be a cool feature in some cases, or way too much information.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Hackers | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.