follow

help me to improve quality

donate

Pages

Thursday 8 June 2017

First Android-Rooting Trojan With Code Injection Ability Found On Google Play Store






"To bypass Google Play Store security checks, the malware creators used a very interesting method: they uploaded a clean app to the store at the end of March, 2017, and would then update it with a malicious version for short period of time," the researchers said. 
"Usually they would upload a clean version back on Google Play the very same day. They did this at least 5 times between 18 April and 15 May."



 


"Furthermore, it can grant the "com.qualcmm.timeservices" app Device Administrator rights without any interaction with the user, just by running commands. It is a very unusual way to get Device Administrator rights," the researchers said.
This malicious 3rd party app is responsible for connecting the infected device to the attacker's command-and-control server, giving out full control of the device into the hands of attackers.






0 comments:

Post a Comment