Top 10 Malware Families (Mobile) of 2011
•Android.Lotoor.A: A Trojan that attempt to exploit vulnerabilities in the Android operating system to gain root privilege.
•Android.Lightdd.A: A Trojan that steals information from Android devices such as IMEI number, IMSI number, etc. and sends stolen information to remote server.
•Android.FakePlayer.A: A Trojan that is disguised as a “media player applications”, and which is used to send SMSs to premium rate numbers.
•Android.Basebridge.A: Is a Trojan that runs malicious services in the background and send information such as “SMS content; phone calls” to servers and also to premium rate numbers.
•Android.Lotoor.B: It attempt to exploit vulnerabilities in the Android operating system to gain root privilege and sends the collected information to remote server. In addition to it, it also creates a backdoor root shell, stored in the system partition in an attempt to survive after software upgrades.
•Android.DroidKungFu.A: Another botnet , which utilizing the root exploits and steals information such as “OS type, SDK version, IMEI number, IMSI number etc. “and send to remote server. It also downloads and installs malicious application.
•Android.Bgserv.A: It transfers the information from the device to a remote location. It collects information in logs and it uses HTTP POST method for posting data. It steals sensitive information.
•Android.Erahsooc.A: It steals information from Android devices and sends SMSs to premium rate numbers. It also sends information such as “SMS content, phone calls OS type, SDK version, IMEI number, IMSI number, location information etc.” to remote server.
•Android.Geimini.A: Android’s botnet, which comes in bundle with popular and legitimate Android application gains root privilege. It transfers the information from the device to a remote location and it uses HTTP POST method for posting data. For example it sends a victim’s geographic location and controls his/her phone remotely.
•Android.GoldDream.B: It creates logs of the incoming SMS messages and outgoing message and calls, and uploads them to a certain web site. It comes with seemingly legitimate games application and which is re-packaged to include malicious code. It sends information such as “SMS content, phone calls OS type, SDK version, IMEI number, IMSI number, location information etc.”
No Comments, Be The First!