• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      event logo
      V3 Technology Awards

      2016 V3 Awards

      • Date: 25 Nov 2016
      • London
      View all events
      Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3-resources-120x194
      Leveraging data for small businesses

      The most successful businesses are those with confidence in their ability to store, access and use data effectively.  Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

      Download
      V3-resources-120x194
      Getting the SMB network just right

      This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • SMB Spotlight
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
    • Apps
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Android apps with Trojan SMS malware infect 300,000 devices, nets crooks $6m

New wave of Trojanised apps uncovered by Panda researchers

Google Android Malware
  • Alastair Stevenson
  • Alastair Stevenson
  • @MonkeyGuru
  • 13 February 2014
  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
0 Comments

A new wave of Trojanised Android apps have infected at least 300,000 smartphones and tablets, according to security researchers at Panda Labs.

Panda Labs technical director Luis Corrons revealed the crime wave in a blog post, warning that the 300,000 figure is a conservative estimate. "Our Panda Mobile Security research team has found a new threat that has infected at least 300,000 people, although that number could be four times higher – 1,200,000," read the post.

The apps reportedly infect users' handsets via a bogus permissions notification, which when agreed to instigates a complex process that forces the victim to send text messages to a premium-rate number owned by the hackers.

"Without the user's knowledge the app will get the phone number of the device, will go to a website and will register it to a premium SMS service. This service requires a confirmation to be activated, which means it sends an SMS to that number with a PIN code," explained the post.

"This app waits for that specific message, once it arrives it intercepts its arrival, parses it, takes the PIN number and confirms your interest in the service. Then it removes it, no notification is shown in the terminal and the SMS is not shown anywhere. Again, all this is done without the user's knowledge."

Corrons said the campaign has already earned the criminals millions of dollars in revenue. "They charge a lot of money for this premium SMS service, if we make a conservative estimate of $20 charged by terminal, we are talking of a huge scam that could be somewhere between $6m and $24m," he said.

Corrons said the apps will undoubtedly earn criminals more money, warning they are all still available for purchase on the Google Play store. However, at the time of publishing we could not find the apps on the Google Play store.

He said the applications' success is largely due to a lack of security awareness from Android users, and that even basic measures could drastically reduce the apps' effectiveness.

"Whatever security solution you use – if any – please always read the permissions needed to install each application and if among them it is the one letting the app read your SMS and connect to internet and it is not really needed, do not install it," he said.

Trojan apps are a growing problem in the Android ecosystem. Because of the open nature of Android, criminals are able to create and sell malware-laden applications on a variety of third-party marketplaces with relative ease. Network giant Cisco estimated in January that 99 percent of all mobile malware is designed to target Android.

  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
  • Topics
  • Security
  • Mobile Software
  • Android
  • malware
  • cyber-crime
  • Hacking
  • Apps
  • Smartphones

V3 Latest

Edward Snowden NSA Prism whistleblower
Snowden points finger at Russia over NSA hack

Tweets offer possible cause for major hack

  • Government
  • 16 August 2016
Cloud computing
IBM beats AWS and Azure in seven-year Workday cloud deal

Deal suggests still market left to play for

  • Cloud Computing
  • 16 August 2016
Hacker
NSA hack sees information up for auction in major security incident

Shadow Brokers hacker group claims responsibility

  • Security
  • 16 August 2016
TechEd 2014 Microsoft logo
Microsoft to issue Windows 7 and 8.1 updates together

Firm claims move will make life easier for admins

  • Operating Systems
  • 16 August 2016
blog comments powered by Disqus
Back to Top

Most read

Surface Book fulcrum hinge
Microsoft Surface Book 2 release date, specs and price rumours
Sage at Accountex
Sage breach exposes personal data of staff at 280 companies
Cloud computing
IBM beats AWS and Azure in seven-year Workday cloud deal
Microsoft Windows 10 on a laptop
Windows 10 Anniversary Update: 8 ways to tackle problems caused by latest release
Galaxy Note 7 render
Samsung Galaxy Note 7 release date, price, specs and features
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube
  • Apps

© Incisive Business Media Limited

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016