Boxer SMS trojan: malware as a global service
Revision as of 19:15, 14 July 2015 by Eric.freyssinet (talk | contribs)
(Publication) Google search: [1]
Boxer SMS trojan: malware as a global service | |
---|---|
![]() | |
Botnet | Boxer |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-11-29 |
Editor/Conference | ESET |
Link | http://blog.eset.com/2012/11/29/android-boxer-a-worldwide-sms-trojan (Archive copy) |
Author | Pablo Ramos |
Type |
Abstract
“ Your Android smartphone could be producing profit for criminals, and here is how: using piece of malware called Android/TrojanSMS.Boxer.AA, a malicious program for Google's Android mobile Operating System that targets 63 different countries, reading the MCC (Mobile Country Code) and MNC (Mobile Network Code) codes from the infected device. In December 2011 twenty-two malicious applications were discovered in the Android Market (Now Google Play) that were able to reach users all of these countries.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1252, editor = {ESET}, author = {Pablo Ramos}, title = {Boxer SMS trojan: malware as a global service}, date = {29}, month = Nov, year = {2012}, howpublished = {\url{http://blog.eset.com/2012/11/29/android-boxer-a-worldwide-sms-trojan}}, }