Hackers hit Android with SMS malware
Kaspersky Lab has identified the first SMS Trojan targeting Android devices.
The first SMS Trojan targeting Android phones has been identified and has been sending out messages from victims' mobiles to premium rate numbers.
This Trojan-SMS breaks into Android phones via a specially-crafted media player application, which features the standard Android extension .APK, Kaspersky Lab claimed.
As soon as it is installed on the phone, the malware sends out SMS texts to premium rate services, with revenue from this landing in the hands of the cyber criminals.
"The IT market research and analysis organisation IDC has noted that those selling devices running Android are experiencing the highest growth in sales among smartphone manufacturers," said Denis Maslennikov, mobile research group manager at Kaspersky Lab.
"As a result, we can expect to see a corresponding rise in the amount of malware targeting that platform."
The security company is planning to roll out Kaspersky Mobile Security for Android in early 2011, Maslennikov added, and the Trojan-SMS.AndroidOS.FakePlayer.a has been logged on anti-virus databases.
A similar technique to this Android attack was seen earlier this year, but was targeting the Symbian OS.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Trend Micro discovered a malicious app running on the S60 platform that sent a message from the user's device, although it was unsure why at the time.
Talking about the new Android Trojan, Trend Micro's advanced threats researcher, Ivan Macalintal, said: "This income-generating scheme is a low-hanging fruit for cyber criminals."
"What makes it unique is the use of Android as the targeted platform and, with the increasing popularity and usage of Android, we can expect more malicious code served up in that alley," he added in a blog post.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Cisco sounds alarm over AsyncOS zero-day flawNews The zero-day vulnerability affects Cisco's Secure Email Gateway and Secure Email and Web Manager appliances – here's what we know so far.
-
EU lawmakers want to limit the use of ‘algorithmic management’ systems at workNews All workplace decisions should have human oversight and be transparent, fair, and safe, MEPs insist
-
Trend Micro issues warning over rise of 'vibe crime' as cyber criminals turn to agentic AI to automate attacksNews Trend Micro is warning of a boom in 'vibe crime' - the use of agentic AI to support fully-automated cyber criminal operations and accelerate attacks.
-
Exploitation of Docker remote API servers has reached a “critical level”News Hackers are targeting Docker’s remote access API as it allows them to pivot from a single container to the host and deploy malware with ease
-
Cyber criminal underground “thriving” as weekly attacks surge by 75% in Q3 2024Cyber attacks reached another all-time high this quarter as digital crime continues to be a highly profitable industry for threat actors
-
Alarm raised over patched Phemedrone Stealer malware that's being used to target Windows PCs - here's what you need to knowNews Phemedrone Stealer is being used to exploit a vulnerability in Windows Defender SmartScreen despite the issue being patched in November 2023
-
SOC modernization and the role of XDRWhitepaper Automate security processes to deliver efficiencies across IT
-
Uncovering the ransomware threat from global supply chainsWhitepaper Effectively mitigate ransomware risk
-
The near and far future of ransomware business modelsWhitepaper Discover how criminals use ransomware as a cyberweapon
-
Trend Micro security predictions for 2023Whitepaper Prioritise cyber security strategies on capabilities rather than costs
