pcappdate. An Android trojan specialized in showing unwanted ads has managed to infect the firmware of 40 low-end Android smartphones, and even a few popular applications, some of them created by cyber-security vendors.
The trojan, named Android.Gmobi.1, or just Gmobi, was discovered this month by Dr.Web security researchers, which pinpointed its origin to a software development kit (SDK) that the developers of the affected firmware images and Android apps used to automate some features inside their products.
Dr.Web didn't provide the name of the SDK but said it helped developers automate the task of showing notifications on an Android smartphone.
Gmobi is specialized in showing ads
The way the trojan operates is simple. Once the device is connected to the Internet or wakes up after being asleep for more than a minute, it will start collecting information on the device and send it to a C&C server.
This includes details such as the user's emails, roaming availability, GPS coordinates, mobile network data, device technical details, and if the user has Google Play installed on his device.
Once these details reach the server, it replies with commands to update the local ads database, add shortcuts for various advertisements on the home screen, display an ad via a notification box, show a notification that when tapped starts an app, or install another app covertly, if the app/firmware through which the trojan operates has the necessary privileges.
Gmobi can show ads in the status bar, via dialogs, interactive dialogs, on top of other apps, on top of the screen (if no app is running), or launch a local browser or Google Play to a specified page.
Removing the trojan is impossible in some cases
Unfortunately, because the trojan is directly embedded in the firmware, removing this threat via an antivirus or by uninstalling the firmware might alter normal OS behavior. For these cases, users have to wait for OEMs to issue new versions of their firmware.
As for the apps where the SDK was used, Dr.Web says that they've informed the developers, and most of them have patched or are in the process of updating their code. The researchers did give out the name of one of the smartphones where Gmobi was detected, which is Micromax AQ5001.
Affected apps included two Trend Micro apps, Dr. Safety and Dr. Booster, and the ASUS WebStorage apps. Dr.Web says that Trend Micro has already patched their applications.
Saturday, March 19, 2016
Related Posts:
New Carbanak Attacks Detected in Early Stages of InfectionCarbanak, the cybercriminal group that robbed more than $1 billion from 100 banks across 30 countries in 2013 and 2014, has been seen once again, and this time, security researchers say they've caught the group in their early… Read More
Hacker Who Aided ISIS Gets 20 Years in PrisonArdit Ferizi, aka Th3Dir3ctorY, 20, a citizen of Kosovo, will spend 20 years in a US prison for providing material support to ISIS hackers by handing over data for 1,351 US government employees. Ferizi obtained the data by h… Read More
Adware Infects Firmware of 40 Low-End Android SmartphonesAn Android trojan specialized in showing unwanted ads has managed to infect the firmware of 40 low-end Android smartphones, and even a few popular applications, some of them created by cyber-security vendors. The trojan, nam… Read More
There Have Been Over 16,000 Software Bugs Detected in 2015In 2015, security researchers from Secunia detected 16,081 vulnerabilities in 2,484 software applications from 263 different vendors. This represents a 2% increase compared to 2014, and a 39% rise compared to 2010. The numbe… Read More
Google, Microsoft, Yahoo Join Forces to Create New Email Encryption ProtocolA group of independent security researchers and major Silicon Valley tech giants have submitted last Friday, March 18, 2016, a proposal for a new email protocol called SMTP STS (Strict Transport Security). STMP has never bee… Read More