Difference between revisions of "GingerMaster Android Malware Utilizing A Root Exploit"
m (1 revision imported) |
m (Text replacement - " août " to " aug") |
||
Line 8: | Line 8: | ||
|Author=Xuxian Jiang, | |Author=Xuxian Jiang, | ||
|NomRevue= | |NomRevue= | ||
|Date=18 | |Date=18 aug2011 | ||
|Editor=CS State University | |Editor=CS State University | ||
|Year=2011 | |Year=2011 |
Latest revision as of 21:31, 5 August 2015
(Publication) Google search: [1]
GingerMaster Android Malware Utilizing A Root Exploit | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2011 / 18 aug2011 |
Editor/Conference | CS State University |
Link | http://www.csc.ncsu.edu/faculty/jiang/GingerMaster/ (Archive copy) |
Author | Xuxian Jiang |
Type |
Abstract
“ Yesterday (08/17/2011), we have just seen the rapid evolution of DroidKungFu in the last two months. Today, my research team, in collaboration with NQ Mobile, identified a new high-risk malware -- GingerMaster, which is the first Android malware that utilizes a root exploit against Android 2.3 (i.e., Gingerbread). Unlike previous ones with root exploits (e.g., DroidKungFu) to compromise phones running Android 2.2 or below, GingerMaster takes advantage of the most recent root exploit against Android platform 2.3 (which was discovered in April 2011 [1]). As this is the first time such malware has been identified, it is not surprising when our experiments show that it can successfully evade the detection of all tested (leading) mobile anti-virus software.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2011BFR845, editor = {CS State University}, author = {Xuxian Jiang}, title = {GingerMaster Android Malware Utilizing A Root Exploit}, date = {18}, month = Aug, year = {2011}, howpublished = {\url{http://www.csc.ncsu.edu/faculty/jiang/GingerMaster/}}, }