Wear is said to not offer enough for mass adoption, even though its been in the market for over 9 months. I personally have a Gear Live which I purchased 8 months ago, and my experience with it has had its ups and downs throughout my time with it. For the longest time, I was not able to recommend the platform to anyone. Since then, a lot of updates have hit Wear watches, some improving battery life, others changing the...
New Windows Malware Infects Android Devices; Protect Yourself with Two Easy Steps
Cross-platform malware is nothing new. And to be more specific, cross-platform malware involving the Android OS isn’t new either. This should come as no surprise, as the pint-sized mobile OS packs nearly as much functionality and freedom as its full-sized brethren.
Some time ago, we saw the Android.Claco trojan. This particular piece of malware used a compromised mobile device to transfect your Windows-powered PC by functioning as a malicious USB drive. Upon connection via USB Mass Storage, Windows AutoRun would then automatically execute the malicious payload.
Up until recently, however, the only cross platform malware involving Android that we’ve seen in the wild has involved infected Android devices targeting desktop computers. Now, Symantec has spotted a new trojan targeting Android devices from infected Windows computers.
The new malware is known as Trojan.Droidpak, and it essentially works by using ADB to install a malicious APK (variant of the previous Android.Fakebank.B trojan) that poses as the Google Play Store (“Google App Store” in the screenshot). Then once run, the malicious APK searches for specific Korean online banking apps. If these apps are found, the malware prompts the user to delete the originals and install malicious versions. It also intercepts and reroutes SMS messages on compromised devices to a predetermined location, presumably to intercept fraud protection messages from said banking institutions.
While this specific piece of malware poses very little concrete threat to those outside of Korea who do not rely on the select banking institutions targeted by the trojan, it is entirely possible that similar attacks exist in other regions, targeting other demographics. This highlights the importance of always being cautious and disabling unnecessary services. Furthermore, users should always exercise caution when connecting their mobile devices to unknown computers.
You can learn more about the specifics by visiting the Symantec Malware Bulletin. But first, make sure you protect yourself by disabling unnecessary services such as USB Debugging and only connecting to trusted computers. Furthermore, do yourself a favor and enable verify apps.
Has Android malware been an issue for you in the past? We’ve seen some evidence suggesting that it largely isn’t an issue for most users due to Android’s multiple layers of defense. However, this new type of attack could potentially bypass these measures on devices with USB debugging enabled and verify apps disabled. Let us know your thoughts on Android malware in the comments below!
[Many thanks to XDA Forum Member dr.eXntriK for the tip!]
Want something on the XDA Portal? Send us a tip!
SlimRoms' website has been experiencing technical difficulties for the last month or so, but it's good to know the team is working hard and is still on top of things. The SlimRoms GitHub repos are getting updated with some major changes showing up. Most notably, some projects are getting a new 5.1 branch: lp5.1! A new, revamped and open source website is also in the works, with a look inspired by material design. We also got a tip about an...
Wireless charging is becoming more and more common as many OEMs are now starting to include this feature in their flagships. There are already dozens of wireless chargers to choose from on the market today, but quality definitely varies. For those of you who charge your devices wirelessly, let us know which charger is your favorite and why.