Pages

Monday, March 3, 2014

Smart Phone First Tor-Based Android Malware

Smart phone gadgets do almost everything, from Internet Financial to Discussing private data files and at the same speed, the mobile viruses industry is also growing.

 The variety of versions of harmful software targeted the mobile phones has allegedly increased about 185% in less than a year.

Security researchers have noticed a growth in the numbers of computer viruses families starting to use TOR-based communications, but recently the Security Researchers at antivirus firm Kaspersky Laboratory have identified the first Tor-Based Malware for Android Operating System.

 The Android OS Malware known as 'Backdoor.AndroidOS.Torec.a', using Tor hidden service method for invisible interaction with Command-and-Control web servers.

Researchers recognized the Trojan is running from .Onion Tor domain and working on performing a free Tor customer for Android mobile phones, called 'Orbot', thus removing the risk of the botnet being recognized and obstructed by law enforcement authorities, although often it's not clear how many gadgets has been infected by this viruses until now.
The Trojan is capable of intercepting and taking inbound SMS, can make USSD demands, taking system details such as 'the phone number, country, IMEI, model, OS version, ' can recover the list of installed programs on the mobile phone, and also can send SMSs to a mentioned number.

Kaspersky did not mention the viruses is focused on taking banking details or not, but the popularity of Android OS is kept encouraging online scammers to develop far more advanced Android viruses with more stealthy and antireverse methods.

Here are some tips you can do to prevent virus’s attacks on your Android phone:
•  Install programs from official Android Market instead of third-party app stores or   
   websites.
•  Before setting up any programs, check the publisher and application reviews.
•  Pay attention to application authorizations during the installation.

•  Install Antivirus and Firewall program.

No comments:

Post a Comment