SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Apple Tankwatch -- Ignore unavailable to you. Want to Upgrade?


To: iggyl who wrote (8792)8/25/2011 10:21:52 PM
From: iggyl  Respond to of 32692
 
Researchers uncover more Android malware on Google's Market
And new texting malware pops up on Chinese download sites

By Gregg Keizer
July 11, 2011 03:45 PM ET
Computerworld - Security researchers have found more malicious Android apps on Google's official download site and being spread through Chinese app stores.

On Friday, Lookout Security spotted four apps on the Android Market that were infected with a variant of the "DroidDream Light" malware which has now plagued the e-store three times this year.

And today, researchers at North Carolina State University announced they had found new malware that forced Android smartphones into texting a premium number.

Lookout's find was the third instance of DroidDream-infected applications making it into Google's e-store, following an original run in March and a second in early June. Those two campaigns forced Google to pull over 80 poisoned apps from its store.

According to Lookout, Google quickly yanked the four new applications from the Android Market.

"Fortunately the malware was available in the Android Market for a short period of time so the number of downloads was limited to 1,000-5,000," Lookout reported in an alert posted to its blog.

The San Francisco-based mobile security company said that, like the June campaign, last Friday's DroidDream Light malware launched itself without user interaction after it was downloaded. DroidDream Light is a stripped-down version of the March attack code.

Once on an Android smartphone, DroidDream Light can prompt owners to download other apps from the market, bait users with a malicious URL or even automatically download more apps to the device.

But Lookout's report was not the only one making the rounds.

On Monday, Xuxian Jiang, an assistant professor in computer science at North Carolina State University, chimed in with a warning of a new Android threat, which he dubbed "HippoSMS."

Jiang has published several Android alerts in the last six weeks, including one last month after he discovered 10 infected apps on the Android Market.

HippoSMS was only published to unauthorized Chinese app stores, however.

Like almost all Android malware, HippoSMS piggybacks on a host app and is installed when that app is downloaded and approved by the user.

Its makers are monetizing the malware by forcing an infected smartphone to text a premium number -- attackers are paid a portion of the revenues earned by such numbers -- but they're also trying to hide that behavior from users.

"It will delete any SMS message if it starts with the number '10,'" said Jiang, noting that numbers such as "10086" and "10010" are used by Chinese mobile service providers to notify customers about ordered services and their current bill balances. "We believe the removal of the related SMS messages is used to hide the additional charges caused from the malware," Jiang said.

Both Lookout and Jiang said one way that Android users can avoid malware is to carefully examine the access permissions an app asks for.

"Use common sense to ensure that the permissions an app requests match the features the app provides," said Lookout.



To: iggyl who wrote (8792)8/26/2011 6:48:19 AM
From: sylvester80  Respond to of 32692
 
Yawwn...that's still almost 2 months old and if you had LOOKOUT (a FREE app) you never would have seen it.... but in any case...."Fortunately the malware was available in the Android Market for [only] a short period of time, so the number of downloads was limited to 1,000 to 5,000,"...

5000 out of 160 million is 0.003%...LMFAO... too funny... more Macs and jailbroken iPhones get infected any given day than any Androids will see in their life time... LMFAO.. too funny...



To: iggyl who wrote (8792)8/26/2011 6:55:06 AM
From: sylvester80  Read Replies (1) | Respond to of 32692
 
Trojan Found in iPhone Jailbreak Software
by Aisha Mazhar on July 30, 2010
worsttech.com

You all may have heard the exciting news of jailbreaking iPhone declared as legal in USA now, well this post covers the dark aspects on the same topic.



By the unveiling of this news cyber criminals has fasten their seat belts in spreading and utilizing fake news in lieu of this news, by giving the user opportunity to download software for the jailbreak iPhone which actually launches a Trojan in form of the software download.

A snapshot extracted from the rouge emails/ notifications attracts the user by such kind of sentences as software is compatible with all the versions and will provide all the access after the unlock. You may download on from our site xxxxxxxx./iphone3gs-3g.exe.

Security researchers team from the Bit defender analyzed this software and intercepted that the executable files has a key logging competence which analyzes, all the information that may be in form of your accounts, passwords, transactions etc it can be any information that has been taking place from your machine over the internet and then sends a copy of the file ahead to a hotmail account.

However we will advice you people that it is better to view and scan the attachment, executables and any unknown software downloads provided by an unknown or stumble user, keep your antivirus updated, Also note this reminder that your iPhone warranty is been compromised on jail breaking and that is also prone to more vulnerabilities as they are never been reviewed. Stay safe and keep your machines safe.