GingerMaster Android Malware Utilizing A Root Exploit
(Publication) Google search: [1]
GingerMaster Android Malware Utilizing A Root Exploit | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2011 / 18 août 2011 |
Editor/Conference | CS State University |
Link | http://www.csc.ncsu.edu/faculty/jiang/GingerMaster/ (Archive copy) |
Author | Xuxian Jiang |
Type |
Abstract
“ Yesterday (08/17/2011), we have just seen the rapid evolution of DroidKungFu in the last two months. Today, my research team, in collaboration with NQ Mobile, identified a new high-risk malware -- GingerMaster, which is the first Android malware that utilizes a root exploit against Android 2.3 (i.e., Gingerbread). Unlike previous ones with root exploits (e.g., DroidKungFu) to compromise phones running Android 2.2 or below, GingerMaster takes advantage of the most recent root exploit against Android platform 2.3 (which was discovered in April 2011 [1]). As this is the first time such malware has been identified, it is not surprising when our experiments show that it can successfully evade the detection of all tested (leading) mobile anti-virus software.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2011BFR845, editor = {CS State University}, author = {Xuxian Jiang}, title = {GingerMaster Android Malware Utilizing A Root Exploit}, date = {Error: Invalid time.}, month = Error: Invalid time., year = {2011}, howpublished = {\url{http://www.csc.ncsu.edu/faculty/jiang/GingerMaster/}}, }