Security alert: new Android malware - TigerBot - identified in alternative markets

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

Security alert: new Android malware - TigerBot - identified in alternative markets
Tigerbot.png
Botnet
Malware TigerBot
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol SMS
Date 2012 / 5 avril 2012
Editor/Conference NQ Mobile
Link http://research.nq.com/?p=402 research.nq.com (research.nq.com Archive copy)
Author
Type

Abstract

NQ Mobile Security Research Center , in collaboration with Dr. Xuxian Jiang’s team at North Carolina State University, has recently uncovered a new malware –TigerBot. Different from most existing malware controlled through web, this malware is controlled via SMS messages. Based on our current analysis, this malware has the built-in payload to execute a variety of commands ranging from uploading current location, sending SMS messages, to even recording phone calls. Also, to hide its existence, this malware chooses not to show any icon on the home screen, but disguises with legitimate app names by pretending to be apps from legitimate vendors such as Google and Adobe.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR983,
   editor = {NQ Mobile},
   author = {},
   title = {Security alert: new Android malware - TigerBot - identified in alternative markets},
   date = {Error: Invalid time.},
   month = Error: Invalid time.,
   year = {2012},
   howpublished = {\url{http://research.nq.com/?p=402 research.nq.com}},
 }