Researchers Uncover ‘Smartest Android Malware Yet’

Android malware makers are getting more serious it seems, as researchers found a malicious application that was using plenty of encryption and obfuscation.

They claimed it is the most sophisticated Android Trojan they’ve ever seen.

The “multi-functional Trojan”, called Obad.a, could send text messages to premium rate numbers – a common attribute of widespread Android malware – but could also download additional malware and even send it to other devices over Bluetooth.

Scary Android malware

It took advantage of apparent zero-day flaws in the Android operating system, one of which gave the app device administrator privileges without showing  up on the users’ list of approved applications with such control. That makes it impossible to delete, according to Russian security firm Kaspersky.

“Also, the cyber criminals found an error in the Android operating system which relates to the processing of the AndroidManifest.xml file. This file exists in every Android application and is used to describe the application’s structure, define its launch parameters, etc.,” the company said in a blog post.

“The malware modifies AndroidManifest.xml in such a way that it does not comply with Google standards, but is still correctly processed on a smartphone thanks to the exploitation of the identified vulnerability. All of this made it extremely difficult to run dynamic analysis on this Trojan.”

To make life detection even harder, all strings in the app are encrypted. “The most important strings containing the C&C address undergo an additional stage of decryption. For this, the Trojan first checks if Internet access is available, then downloads the page facebook.com,” the researchers said. “It extracts a certain element of that page, and uses it as decryption key. Thus, Backdoor.AndroidOS.Obad.a can only decrypt C&C addresses when Internet access is available.”

All the stolen data is passed to the C&C server at androfox.com, including device information and whether or not device administrator privileges had been obtained.

The researchers noted the malware was not widespread despite its sophistication, as installation attempts made up no more than 0.15 percent of all attempts to infect mobile devices with various malware over a three day period.

But the fact Android malware is looking increasingly like Windows kit shows how the Google OS is becoming a genuine target for dedicated cyber criminals. Google had not responded to a request for comment at the time of publication.

What do you know about Internet security? Find out with our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Anthropic Launches Enterprise-Focused Claude, Plus iPhone App

Two updates to Anthropic's AI chatbot Claude sees arrival of a new business-focused plan, as…

2 hours ago

TikTok Viewed As Chinese Influence Tool By Most Americans – Poll

Most people in the United States view TikTok as a Chinese influence tool a poll…

16 hours ago

Ofcom Confirms OnlyFans Investigation Over Age Verification

UK regulator confirms it is investigating whether OnlyFans is doing enough to prevent children accessing…

16 hours ago

Ex Google Staff Fired Over Israel Protest File NLRB Complaint

Dismissed staff file complaint with a US labor board, and allege Google unlawfully terminated their…

18 hours ago

Tesla Axes Entire Supercharger Team, Plus Senior Executives

Elon Musk dismisses two senior Tesla executives, plus the entire division that runs Tesla's Supercharger…

19 hours ago

Microsoft, OpenAI Sued By More Newspaper Publishers

Eight newspaper publishers in the US allege Microsoft and OpenAI used their millions of their…

20 hours ago