GingerMaster Android Malware Utilizing A Root Exploit

From Botnets.fr
Revision as of 16:22, 7 February 2015 by Eric.freyssinet (talk | contribs) (1 revision imported)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

GingerMaster Android Malware Utilizing A Root Exploit
Botnet
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2011 / 18 août 2011
Editor/Conference CS State University
Link http://www.csc.ncsu.edu/faculty/jiang/GingerMaster/ (Archive copy)
Author Xuxian Jiang
Type

Abstract

Yesterday (08/17/2011), we have just seen the rapid evolution of DroidKungFu in the last two months. Today, my research team, in collaboration with NQ Mobile, identified a new high-risk malware -- GingerMaster, which is the first Android malware that utilizes a root exploit against Android 2.3 (i.e., Gingerbread). Unlike previous ones with root exploits (e.g., DroidKungFu) to compromise phones running Android 2.2 or below, GingerMaster takes advantage of the most recent root exploit against Android platform 2.3 (which was discovered in April 2011 [1]). As this is the first time such malware has been identified, it is not surprising when our experiments show that it can successfully evade the detection of all tested (leading) mobile anti-virus software.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2011BFR845,
   editor = {CS State University},
   author = {Xuxian Jiang},
   title = {GingerMaster Android Malware Utilizing A Root Exploit},
   date = {Error: Invalid time.},
   month = Error: Invalid time.,
   year = {2011},
   howpublished = {\url{http://www.csc.ncsu.edu/faculty/jiang/GingerMaster/}},
 }