Experts at Kaspersky Lab have identified a new Android trojan which is highly sophisticated. The trojan is called 'Obad.a'.
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading...

A number of Android trojans have surfaced in recent months, given the fact that the platform is an easy target. Kaspersky Lab has now identified a new trojan which is considered the most sophisticated Android trojan to date. It is named ‘Obad.a’ and makes use of a number of as-yet-unidentified Android bugs.


Android trojan

The complete name of the trojan is Backdoor.AndroidOS.Obad.a. It can not only sneak into a handset rather discreetly, it can even expand to other nearby handsets through Bluetooth and Wi-Fi. Once a handset is infected, it lets the attacker leverage the handset to send out more malicious text messages, thereby seeking access to more devices.

According to a post written by Roman Unuchek of Kaspersky Lab, ‘To conclude this review, we would like to add that Backdoor.AndroidOS.Obad.a looks closer to Windows malware than to other Android trojans, in terms of its complexity and the number of unpublished vulnerabilities it exploits. This means that the complexity of Android malware programs is growing rapidly alongside their numbers.’

Interestingly, the point of infection of this trojan is not through any of Android apps. Rather, it spreads through malicious text messages, which is far more handy and convenient for the attackers. Many users tend to fall victim to malicious text messages, unaware how such an SMS can infect their device.

As soon as the trojan is inside an Android device, it is able to connect to a command-and-control server and upload sensitive user data such as phone number, carrier name, IMEI number, account balance as well as the MAC addresses of any devices that are connected to the infected handset.

The trojan essentially hints that it is the work of a highly sophisticated hacking team which was able to not only create such an advanced piece of malicious software, but did so while exploiting such Android bugs which hadn’t been uncovered so far.

Source: Kaspersky Lab

Courtesy: Arstechnica

Buy Cheapest Related Product From Amazon.com


PQI Showed NFC-Encrypted Flash Drive

Plan To Build World’s Tallest Building In 90 Days Got A Nod
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On June 10, 2013(3 years, 3 months ago.)

You May Also Like:

What Do You Think?

Leave a Reply




Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.


Recent Search

Recent Tutorials

There is a high-risk XSS Vulnerability in W3 Total Cache, and we have got the guide to the fix for you.
Check out this tutorial to know how to install Apple watchOS 3 beta certificate on your Apple Watch and start enjoying the new version.
If you are trying to jailbreak iPhone, iPad or iPod on iOS 9.2 - 9.3.3 without using a computer or Apple ID, then check this video tutorial.
Pokemon Go users are complaining about the crashing and server issues. Check out the tutorial to solve error problems and thanks us later.
Turning off Wi-Fi Assist is a great way to save mobile data since it automatically starts using cellular data when Wi-Fi signal is poor .
If you want to secure your SIM card from others using it, then check out this tutorial to know how to set up the SIM Pin code on your iPhone.
CiderTV is a great alternative to control Apple TV from the Notification Center. Check out this tutorial to set up CiderTV on your iPhone.
Are you annoyed by the split screen mode on the iPhone 6 Plus or 6s Plus? Check out this quick tutorial to turn off split screen feature.
If you could not wait to installed the iOS 10 beta version on you iPhone and now struggling for the errors, then this tutorial is for you.
Siri might not understand the question you asked. But you can use Siri by editing the text that you asked & it will give an updated answer.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook