Android Malware uses built-in firewall to block security apps

Android Malware uses built-in firewall to block security AppsEven if some malware families never get to cause worldwide damage, it's sometimes interesting to read about new techniques that certain malware authors employ to create their threats.

One of the most recent cases is a malware family that targets Android devices in China, discovered by Symantec and named Android.Spywaller.

The uniqueness of this threat is the fact that, during infection, the malware looks for Qihoo 360, a popular security app among Chinese Android users.

The malware searches and registers on the device with the same UID (unique identifier) used by the Qihoo 360 app, and then loads a binary called DroidWall, a version of the UNIX iptable package, modified to run on Android devices.

The iptable package is a well-known firewall utility for Linux systems, and DroidWall was developed by independent security researchers Rodrigo Rosauro, who later sold it to AVAST in 2011. Since the app spent a few years as open source, malware authors can still find it via Google Code or GitHub repositories.

Just like in Android.Spywaller's case, DroidWall can be used to block security applications from communicating with their cloud-based threat analysis servers, rendering the security apps useless, and giving the malware free and safe access to the device.

Symantec researchers say that the malware is not a very common infection among Chinese users, so there's nothing to worry about just yet.

To infect users, the malware poses as a Google app called "Google Service," taking advantage of the lack of an official Google Play Store in the country. (There is no official Google app called Google Service.)

Spreading via unofficial Android app stores and fooling users into giving it admin permissions, Android.Spywaller goes on to work in the phone's background, stealing information from the device, and then uploading it to one of its command servers.

Symantec reports that the app will search and exfiltrate data such as call logs, SMS, GPS readings, system browser data, emails, radio, images, and contact lists.

Additionally, the app also gathers data from other apps such as BlackBerry Messenger, Oovoo, Coco, QQ, SinaWeibo, Skype, Talkbox, TencentWeibo, Voxer, Wechat, WhatsApp, and Zello.

Researchers say that Android.Spywaller is one of the most intrusive spyware families they've found, the malware covering multiple data types and sources of information at once.

Source: Softpedia

Tags: Android, security, viruses

Comments
Add comment

Your name:
Sign in with:
or
Your comment:


Enter code:

E-mail (not required)
E-mail will not be disclosed to the third party


Last news

 
Consumer group recommends iPhone 8 over anniversary model
 
LTE connections wherever you go and instant waking should come to regular PCs, too
 
That fiction is slowly becoming a reality
 
The Snapdragon 845 octa-core SoC includes the Snapdragon X20 LTE modem
 
Human moderators can help make YouTube a safer place for everyone
 
Google says Progressive Web Apps are the future of app-like webpages
 
All 2018 models to sport the 'notch'
 
The biggest exchange in South Korea, where the BTC/KRW pair is at $14,700 now
The Samsung Galaxy A5 (2017) Review
The evolution of the successful smartphone, now with a waterproof body and USB Type-C
February 7, 2017 /
Samsung Galaxy TabPro S - a tablet with the Windows-keyboard
The first Windows-tablet with the 12-inch display Super AMOLED
June 7, 2016 /
Keyboards for iOS
Ten iOS keyboards review
July 18, 2015 /
Samsung E1200 Mobile Phone Review
A cheap phone with a good screen
March 8, 2015 / 4
Creative Sound Blaster Z sound card review
Good sound for those who are not satisfied with the onboard solution
September 25, 2014 / 2
Samsung Galaxy Gear: Smartwatch at High Price
The first smartwatch from Samsung - almost a smartphone with a small body
December 19, 2013 /
 
 

News Archive

 
 
SuMoTuWeThFrSa
     12
3456789
10111213141516
17181920212223
24252627282930
31      




Poll

Do you use microSD card with your phone?
or leave your own version in comments (4)