December 28, 2012
Android Trojan Capable of Launching DDOS Attacks from your Smartphone
Do you like this story?
Security researchers from Russian firm Doctor Web have come across a new Android Trojan they call Android.DDoS.1.origin. The piece of malware can be used for various malicious tasks, including to launch distributed denial-of-service (DDOS) attacks and to send SMS messages.
For the time being, it’s uncertain how the Trojan is distributed, but experts believe the cybercriminals might be disguising it as a legitimate Android application.
Once it’s installed on a smartphone, the malware creates a fake Google Play icon on the desktop. When executed, this shortcut opens the real Google Play in order to avoid raising any suspicion.
After being executed, the Trojan connects to a remote server, sends it the victim’s phone number, and waits for further SMS commands.
The masterminds of Android.DDoS.1.origin can send various SMS commands. One of them orders the infected device to start sending out packets to a certain server, basically launching a DDOS attack against it.
While this only affects the phone’s performance, there are other activities that can be done by this threat. For instance, the cybercriminals can order the device to start sending out SMS messages to certain numbers.
These SMSs can be used to sign up the victim for premium mobile services or they can be utilized to send out spam.
Messages can also be sent to premium rate numbers, inflating the victim’s phone bill and implicitly filling the fraudsters’ pockets.
“Activities of the Trojan can lower performance of the infected handset and affect the well-being of its owner, as access to the Internet and SMS are chargeable services. Should the device send messages to premium numbers, malicious activities will cost the user even more,” experts noted.
Doctor Web has updated its products to ensure that its customers are protected against this threat.
For the time being, it’s uncertain how the Trojan is distributed, but experts believe the cybercriminals might be disguising it as a legitimate Android application.
Once it’s installed on a smartphone, the malware creates a fake Google Play icon on the desktop. When executed, this shortcut opens the real Google Play in order to avoid raising any suspicion.
After being executed, the Trojan connects to a remote server, sends it the victim’s phone number, and waits for further SMS commands.
The masterminds of Android.DDoS.1.origin can send various SMS commands. One of them orders the infected device to start sending out packets to a certain server, basically launching a DDOS attack against it.
While this only affects the phone’s performance, there are other activities that can be done by this threat. For instance, the cybercriminals can order the device to start sending out SMS messages to certain numbers.
These SMSs can be used to sign up the victim for premium mobile services or they can be utilized to send out spam.
Messages can also be sent to premium rate numbers, inflating the victim’s phone bill and implicitly filling the fraudsters’ pockets.
“Activities of the Trojan can lower performance of the infected handset and affect the well-being of its owner, as access to the Internet and SMS are chargeable services. Should the device send messages to premium numbers, malicious activities will cost the user even more,” experts noted.
Doctor Web has updated its products to ensure that its customers are protected against this threat.
About the Author:
Ifeanyi Emeka is the founder of this blog and also writes for Tech Forked. He is passionate about tech stuffs and loves customizing blogger themes.
Popular This Week
Android Trojan Capable of Launching DDOS Attacks from your Smartphone
2012-12-28T19:07:00Z
dfgdfg
Android|Android Malware|DDos Attack|Malware|SMS Trojan|
Subscribe to:
Post Comments (Atom)