Hackers hit Android with SMS malware
Kaspersky Lab has identified the first SMS Trojan targeting Android devices.
The first SMS Trojan targeting Android phones has been identified and has been sending out messages from victims' mobiles to premium rate numbers.
This Trojan-SMS breaks into Android phones via a specially-crafted media player application, which features the standard Android extension .APK, Kaspersky Lab claimed.
As soon as it is installed on the phone, the malware sends out SMS texts to premium rate services, with revenue from this landing in the hands of the cyber criminals.
"The IT market research and analysis organisation IDC has noted that those selling devices running Android are experiencing the highest growth in sales among smartphone manufacturers," said Denis Maslennikov, mobile research group manager at Kaspersky Lab.
"As a result, we can expect to see a corresponding rise in the amount of malware targeting that platform."
The security company is planning to roll out Kaspersky Mobile Security for Android in early 2011, Maslennikov added, and the Trojan-SMS.AndroidOS.FakePlayer.a has been logged on anti-virus databases.
A similar technique to this Android attack was seen earlier this year, but was targeting the Symbian OS.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Trend Micro discovered a malicious app running on the S60 platform that sent a message from the user's device, although it was unsure why at the time.
Talking about the new Android Trojan, Trend Micro's advanced threats researcher, Ivan Macalintal, said: "This income-generating scheme is a low-hanging fruit for cyber criminals."
"What makes it unique is the use of Android as the targeted platform and, with the increasing popularity and usage of Android, we can expect more malicious code served up in that alley," he added in a blog post.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
AI layoffs could spark a new wave of offshoringNews Analysts expect a wave of rehiring next year in the wake of AI layoffs. That may sound like good news for workers, but it'll probably involve offshoring or outsourcing.
-
Hackers are using these malicious npm packages to target developers Windows, macOS, and Linux systemsNews Security experts have issued a warning to developers after ten malicious npm packages were found to deliver infostealer malware across Windows, Linux, and macOS systems.
-
Exploitation of Docker remote API servers has reached a “critical level”News Hackers are targeting Docker’s remote access API as it allows them to pivot from a single container to the host and deploy malware with ease
-
Cyber criminal underground “thriving” as weekly attacks surge by 75% in Q3 2024Cyber attacks reached another all-time high this quarter as digital crime continues to be a highly profitable industry for threat actors
-
Alarm raised over patched Phemedrone Stealer malware that's being used to target Windows PCs - here's what you need to knowNews Phemedrone Stealer is being used to exploit a vulnerability in Windows Defender SmartScreen despite the issue being patched in November 2023
-
SOC modernization and the role of XDRWhitepaper Automate security processes to deliver efficiencies across IT
-
Uncovering the ransomware threat from global supply chainsWhitepaper Effectively mitigate ransomware risk
-
The near and far future of ransomware business modelsWhitepaper Discover how criminals use ransomware as a cyberweapon
-
Trend Micro security predictions for 2023Whitepaper Prioritise cyber security strategies on capabilities rather than costs
-
'Potentially unsecured' SMBs are propping up an IT supply chain riddled with ransomwareNews More than half of IT supply chains have been impacted by ransomware attacks in recent years and organisations are failing to implement the necessary steps to prevent future damage
