Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Android Security News

SMS-Controlled Malware Hijacking Android Phones 94

wiredmikey writes "Security researchers have discovered new Android malware controlled via SMS that can do a number of things on the compromised device including recording calls and surrounding noise. Called TigerBot, the recently discovered malware was found circulating in the wild via non-official Android channels. Based on the code examination, the researchers from NQ Mobile, alongside researchers at North Carolina State University said that TigerBot can record sounds in the immediate area of the device, as well as calls themselves. It also has the ability to alter network settings, report its current GPS coordinates, capture and upload images, kill other processes, and reboot the phone. TigerBot will hide itself on a compromised device by forgoing an icon on the home screen, and by masking itself with a legit application name such as Flash or System. Once installed and active, it will register a receiver with a high priority to listen to the intent with action 'android.provider.Telephony.SMS_RECEIVED.'"
This discussion has been archived. No new comments can be posted.

SMS-Controlled Malware Hijacking Android Phones

Comments Filter:

"Life begins when you can spend your spare time programming instead of watching television." -- Cal Keegan

Working...