www.unuudur.com » DeathRing, a new Pre-loaded mobile trojan in the wild

DeathRing, a new Pre-loaded mobile trojan in the wild

[Нийтэлсэн: 11:39 06.12.2014 ]


The number of Pre-loaded mobile trojan in the wild is increasing, DeathRing is the last one discovered by the experts at Lookout firm.

It’s not first the time that Android handsets come preloaded with malware, but cyber security experts are warning of a worrying increase of the cases. The problem is widespread in Asia and Africa, where criminals are able to compromise the supply chain. Similar cases are frequent for a cheap, low-level devices. The AV company Dr. Web recently spotted a mobile Trojan embedded in the firmware of several low price Android devices.

Security researchers at Lookout firm have detected pre-loaded instances of the DeathRing malware for the second time in 2014, unfortunately they are not currently aware of where in the supply chain the mobile trojan is installed.

“DeathRing is a Chinese trojan that is pre-installed on a number of smartphones most popular in Asian and African countries. Detection volumes are moderate, though we consider this a concerning threat given its pre-loaded nature and the fact that we are actively seeing detections of it around the world.” reports the blog post from Lookout.

The DeathRing trojan has been detected in Vietnam, Indonesia, India, Nigeria, Taiwan, and China.

The DeathRing trojan masquerades as a ringtone app, but once infected the mobile device, it is able to download malicious content from the C&C servers to use for malicious activities. The malicious app downloads SMS and WAP content from the control infrastructure as explained by the experts.

“For example, DeathRing might use SMS content to phish victim’s personal information by fake text messages requesting the desired data. It may also use WAP, or browser, content to prompt victims to download further APKs — concerning given that the malware authors could be tricking people into downloading further malware that extends the adversary’s reach into the victim’s device and data.” states the post.

Very interesting are the ways used by the malware to start malicious operation, basically it could activate itself in these cases:

The DeathRing malware will activate if the phone is powered down and rebooted five times.

The DeathRing trojan will start after the victim has been away and present at the device at least fifty times.

The DeathRing malware is loaded in the system directory of several devices mostly from third-tier handset manufacturers, which include:

Counterfeit Samsung GS4/Note II

Various TECNO devices

Gionee Gpad G1

Gionee GN708W

Gionee GN800

Polytron Rocket S2350

Hi-Tech Amaze Tab

Karbonn TA-FONE A34/A37

Jiayu G4S – Galaxy S4 Clone

Haier H7

No manufacturer specified i9502+ Samsung Clone

Earlier this year, the experts at Lookout detected a similar strain of pre-loaded malware called Mouabad, which affected predominantly Asian countries. The principal problem approaching pre-loaded malware is the impossibility for security vendors to remove them.

Pierluigi Paganini


Mongolia Celebrates 60 Years in the United Nations
[Нийтэлсэн: 03.11.2021 ]
[Эх сурвалж: ]
SouthGobi Announces Profit Warning and Business Update
[Нийтэлсэн: 29.10.2021 ]
[Эх сурвалж: ]
Coal truckers stuck at Mongolia-China border
[Нийтэлсэн: 29.10.2021 ]
[Эх сурвалж: ]
Chile protests take toll on Antofagasta quarterly output
[Нийтэлсэн: 23.01.2020 ]
[Эх сурвалж: ]
Metallurgical coal prices starting to slip: Fitch
[Нийтэлсэн: 02.10.2018 ]
[Эх сурвалж: ]
Copper price plunges to 1-year low
[Нийтэлсэн: 14.07.2018 ]
[Эх сурвалж: ]
Global Religion and the United Front: The Case of Mongolia
[Нийтэлсэн: 11.07.2018 ]
[Эх сурвалж: ]
Thermal coal prices hit 6-year high
[Нийтэлсэн: 09.07.2018 ]
[Эх сурвалж: ]
Former Rio Tinto exec jailed for corruption in China let free
[Нийтэлсэн: 09.07.2018 ]
[Эх сурвалж: ]

Get Flash to see this player.