Mobile security researchers have discovered a server located in Germany that hosts more than 1,300 websites dedicated to distributing mobile malware as threat to mobile users continue to escalate.
The revelation comes amid signs of the increasing threat to the Android platform.
The German server hosts five categories of sites, based on the guise they use for distributing the malicious code: Android Market apps; Opera Mini apps, pornographic apps; app storage sites; and others that were inaccessible during the time of checking, said Paul Pajares, a fraud analyst with Trend Micro.
“[These] sites that are used to launch mobile malware, targeting Android OS and Symbian,” said Pajares.
Earlier this week, Xuxian Jiang, a computer scientist at North Caroline State University posted details of a new piece of Android-based malware, dubbed RootSmart.
RootSmart is notable because it appears to be one of the first examples of botnet malware targeted at Android handsets.
Once installed, the malware will surreptitiously contact command and control servers and attempt to download a root exploit, known as GingerBreak.
Analysis of RootSmart by Cathal Mullaney, at Symantec, suggests that the malware has been used to send premium rate SMS.
“We can see the botmaster is generating anywhere between $1,600 to $9,000 per day and $547,500 to $3,285,000 per year the botnet is running,” said Mullaney.
The malware comes bundled with a legitimate application for configuring phone settings that is available via a third-party app store. It has not yet been spotted in Google's official Android Market.
The flight will take off from California's Mojave Air and Space Port and could happen as soon as 13th December
Earth was showered with heavy particles called muons, which could have caused mutations and cancer in animals
Uber manager raised concerns about self-driving vehicle programme five days before fatal Uber crash in Arizona
Uber manager complained about series of near misses by autonomous vehicles that had not been properly investigated
Privilege escalation bug already being exploited in the wild