Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity
    • Mobile

    Android Wallpaper Trojan Racks Up Charges in China

    Written by

    Robert Lemos
    Published August 21, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Seven risque wallpaper apps available through China’s largest mobile marketplace, GFan, are actually Trojan horses, infecting Android smartphones by downloading malicious content after the applications are installed, mobile security firm TrustGo warned in a recent analysis.

      The malware, which has infected the smartphones of an estimated half million Chinese users, allows the attackers to remotely charge the user through the China Mobile Short Message Service (SMS) Payment system, the firm stated in the Aug. 15 advisory.

      The Trojan also disables the user’s ability to remove the malicious software by obtaining administrator permissions through an aggressive social engineering tactic, said Jeff Becker, head of marketing for TrustGo.

      “Once it asks for the administrator permissions, it is not cancelable,” Becker said. “The cancel button is disabled and it just continually pops up these requests for permissions, and eventually the user just grants them to get rid of this dialog box.”

      The fraudulent application appears to be one of seven legitimate wallpaper downloads from GFan, the largest Chinese mobile app marketplace. The app requests permission to install an additional file, “Android System Service,” which is the malicious functionality of the program. Updating the software after installation is a way to bypass the security scanning conducted by many app stores. Security researcher Charlie Miller of Accuvant, for example, used a similar technique to get around Apple’s App Store restrictions last year.

      Once updated with its malicious functionality and administrator rights, the Trojan horse can be controlled via its configuration file to enable updates by the fraudsters to change the frequency of fraudulent charges and amount of each transaction.

      The criminals behind the scheme typically charge small amounts in an attempt to stay unnoticed. The malware can also intercept and send SMS communications, which is particularly useful for banking fraud. Banks often use SMS messages to confirm a suspicious transaction. By intercepting and deleting such messages, the attacker can hide ongoing fraud.

      “The user is unaware that any payment has been made or any confirmation issued,” says Becker.

      Using legitimate applications to hide malware is the most common way for criminals to get malicious code into the mobile app marketplaces, such as Google Play and Apple’s App Store. Of the top 100 mobile applications in each store, more than 90 percent have been hacked, pirated or modified by third parties, according to application-security firm Arxan Technologies, which released a report on the trend on Aug. 20.

      The hacking of top apps is not necessarily nefarious. The top modifications are disabling or circumventing security, unlocking features, pirating the software, removing ads, and-of course-creating versions to carry malware, the firm stated.

      “The integrity of mobile apps can be easily compromised through new tampering (and) reverse-engineering attack vectors,” Jukka Alanen, vice president at Arxan, said in a statement. “The traditional approaches to application security such as secure software development practices and vulnerability scanning cannot address the new hacking patterns that we identified.”

      Traditionally, mobile phones have been considered more secure than their PC counterparts because applications are downloaded from central repositories, where malicious apps can be scanned, discovered and removed. In addition, store operators can remove rogue applications from customers’ phones, if they are later found to be malicious.

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×