Anaru malware now live and ready to steal

From Botnets.fr
Revision as of 21:50, 5 August 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " www.symantec.com" to "")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Anaru malware now live and ready to steal
Anaru.png
Botnet Anaru
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 07 septembre 2012
Editor/Conference Symantec
Link http://www.symantec.com/connect/ko/blogs/anaru-malware-now-live-and-ready-steal (Archive copy)
Author Joji Hamada
Type

Abstract

Recently, I blogged about a famous Anime character named Anaru who was being used to steal contact details from Android devices. At the time of investigation, the app appeared to be in a testing phase, with the possibility that it might have been created for fun. However, the app’s creators now appear to have moved to the next level and are now actively enticing Android device owners to install the app.

The Anaru malware, which Symantec detects as Android.Maistealer, is now hosted on multiple, dedicated websites that resemble Google Play. The app is not available on Google Play, as far as I am aware of, and is only available on these dedicated websites.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1153,
   editor = {Symantec},
   author = {Joji Hamada},
   title = {Anaru malware now live and ready to steal},
   date = {Error: Invalid time.},
   month = Error: Invalid time.,
   year = {2012},
   howpublished = {\url{http://www.symantec.com/connect/ko/blogs/anaru-malware-now-live-and-ready-steal}},
 }