Filtered by: Scitech
SciTech

SMS-controlled Android Malware steals users' data


A new data-stealing malware is targeting devices using Google’s Android operating system, but may have the distinction of being among the first to be controlled by text messaging, a hacker news site reported this week.
 
The Hacker News said the SMS-controlled malware, dubbed TigerBot, can record phone calls, upload the device’s GPS location, and reboot the phone.
 
“The current information about this malware show that it can execute a range of commands including uploading the phone’s current location, sending SMS messages, and even recording phone calls. It works by intercepting SMS messages sent to the phone and checking to see if they are commands for it to act. If they are, it executes the command and then prevents the message from being seen by the user,” The Hacker News said.
 
It said researchers at NQ Mobile and at North Carolina State University discovered TigerBot, which differs from traditional malware since it is controlled by SMS instead of by a command-and-control (C&C) server on the Internet.
 
Also, the researchers found TigerBot tries to hide itself from the user by not showing any icon on the home screen and by using legitimate sounding app names (like System) or by copying names from trusted vendors like Google or Adobe.
 
The Hacker News said the malware has so far been found to support these commands:
 
  • Record the sounds in the phone, including the phone calls, the surrounding sounds and etc.
  • Change the network setting.
  • Upload the current GPS location.
  • Capture and upload the image.
  • Send SMS to a particular number.
  • Reboot the phone.
  • Kill other running processes.
 
The Hacker News advised Android users to download only applications from trusted sources, reputable application stores, and markets.
 
It also advised Android users to check reviews, ratings and developer information before downloading. — TJD, GMA News