Please create an account to participate in the Slashdot moderation system


Forgot your password?
Android Cellphones Communications Handhelds Privacy Security

Android Trojan Records Phone Calls 74

jbrodkin writes "A new Android Trojan is capable of recording phone conversations, according to a CA security researcher. While a previous Trojan found by CA logged the details of incoming and outgoing phone calls and the call duration, new malware identified this week records the actual phone conversations in AMR format and stores the recordings on the device's SD card. The malware also 'drops a 'configuration' file that contains key information about the remote server and the parameters,' CA security researcher Dinesh Venkatesan writes, perhaps suggesting that the recorded calls can be uploaded to a server maintained by an attacker. Installation of the Trojan requires some user interaction, but the malware recreates the look and feel of the standard Android application installation process, and may fool some unsuspecting users."
This discussion has been archived. No new comments can be posted.

Android Trojan Records Phone Calls

Comments Filter:
  • by s0litaire ( 1205168 ) on Monday August 01, 2011 @08:03PM (#36954352)

    no need for trojans

    check android market for the developer "skvalex" and check the link in his "CallRecorder" app..
    it's been around for nearly a year!!

  • by dizzysoul ( 2275254 ) on Monday August 01, 2011 @08:37PM (#36954654)
    Android has strict permissions enforcement for every application. It's even built into the marketplace! You cannot install an application without first being told WHAT the application wants access to. If the application wants to record your phone calls, the installer will specifically tell you the application is requesting access to your microphone. The installer forces you to scroll down to hit next, and there is literally NO WAY you can miss reading it. If you install applications from an untrusted source, Android will specifically WARN YOU that you could be installing something dangerous. The above article is nothing but FUD. If you read the source article, it says you have to install from an untrusted source, go through the warnings, and still go through the installation process.

You are in a maze of little twisting passages, all different.