Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Android
    • Android
    • Cybersecurity
    • Development
    • Mobile
    • Servers

    Latest Android Malware Infects Gingerbread via Jailbreak Exploit

    Written by

    Fahmida Y. Rashid
    Published August 23, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Researchers have uncovered the first malware using the “Gingerbreak” root exploit for Android 2.3, code-named “Gingerbread.”

      GingerMaster, a variant of the DroidKungFu malware that appeared earlier this year, has a root exploit that gives the attacker control of the infected device, Xuxian Jiang, an associate professor at North Carolina State University’s department of computer science, wrote in a blog post Aug. 18. NC State researchers worked with mobile security vendor NetQin and discovered that GingerMaster wrapped malicious code around a jailbreak exploit for Android 2.3 devices.

      Once the malicious application is downloaded and installed onto the device, it gains root privileges on the computer and transmits data stored on the device to a remote server, the researchers said. The information stolen includes the user identifier, SIM card number, telephone number, IMEI number, IMSI number screen resolution and local time, according toVanja Svajcer, a principal virus researcher in SophosLabs.

      “The GingerMaster malware is repackaged into legitimate apps,” said Jiang. The applications masquerade as popular applications to encourage users to download it. The researchers also found that several mobile antivirus tools failed to detect the applications as malicious.

      Svajcer analyzed the application, which claims to display “Beauty of the Day” pictures. Available from a Chinese alternative Android Market, the application requested 16 different permissions from the user upon installation, including the ones to read logs, access the Internet, write to the SD card, access the file system and access owner data.

      Once installed, GingerMaster will also attempt to install a root shell into the system partition for later use. The malware also installs various utilities onto the partition, “supposedly to make removal more difficult” and for additional functionality, Svajcer said. Once a malicious process gets roots, “its powers are potentially unlimited,” he said.

      With control over the mobile device, GingerMaster contacts the remote command-and-control server for follow-up instructions. It can download and install applications on its own without the user’s permission, Jiang found.

      It’s “exceptionally difficult” to gauge the impact of Android malware distributed outside the official Android market, Tim Armstrong, a malware researcher at Kaspersky Lab, told eWEEK. “Due to the fact that new variants keep arriving, we can assume there is money being made, and users being infected, or the malware authors would likely move onto other platforms,” Armstrong said.

      Users should avoid alternative Android Marketplaces unless they have “strong evidence” the applications are trustworthy, Svajcer recommended. Kaspersky’s Armstrong pointed out that the term “alternative markets” also includes independent Websites, forums, peer-to-peer sharing sites and even email, as users can install applications from all these sources.

      More importantly, users should look at the permissions list and avoid installing applications that request more than what seems reasonably necessary. GingerMaster is an application that downloads pictures from a Website, Svajcer said, adding, “Why would it need permissions such as WRITE_USER_DATA and MOUNT_UNMOUNT_FILESYSTEMS?”

      Android malware attacks have jumped by 76 percent over the past three months, making Android the most heavily attacked mobile platform, McAfee found in its latest quarterly threat report, released Aug. 22.

      “The Android malware writing scene is heating up as the season of summer holidays is coming to its end. Last week, we received a record number of samples which are now waiting to be analyzed in detail,” said Svajcer.

      GingerMaster may compromise Android 2.2 and earlier devices with some adjustments, Jiang said. Even though Google has updated Gingerbread several times since it was released in December, many carriers have not yet updated their devices to the latest version of 2.3.3 or to 2.3.4. Jiang’s team also found other DroidKungFu variants in alternate Android application stores that used similar root exploits for earlier versions of Android.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×