The Latest in IT Security

Top 10 Malware Families (Mobile) of 2011

31
Dec
2011

Today is the last day of the year and the right time to list out the top 10 Android Malware of this year. Below list is based on our report which is generated from the automated feedback that we collect from Quick Heal installations across India.

Top 10 Malware Families (Mobile) of 2011

.Android.Lotoor.A: A Trojan that attempt to exploit vulnerabilities in the Android operating system to gain root privilege.

.Android.Lightdd.A: A Trojan that steals information from Android devices such as IMEI number, IMSI number, etc. and sends stolen information to remote server.

.Android.FakePlayer.A: A Trojan that is disguised as a “media player applications”, and which is used to send SMSs to premium rate numbers.

.Android.Basebridge.A: Is a Trojan that runs malicious services in the background and send information such as “SMS content; phone calls” to servers and also to premium rate numbers.

.Android.Lotoor.B: It attempt to exploit vulnerabilities in the Android operating system to gain root privilege and sends the collected information to remote server. In addition to it, it also creates a backdoor root shell, stored in the system partition in an attempt to survive after software upgrades.

.Android.DroidKungFu.A: Another botnet , which utilizing the root exploits and steals information such as “OS type, SDK version, IMEI number, IMSI number etc. “and send to remote server. It also downloads and installs malicious application.

.Android.Bgserv.A: It transfers the information from the device to a remote location. It collects information in logs and it uses HTTP POST method for posting data. It steals sensitive information.

.Android.Erahsooc.A: It steals information from Android devices and sends SMSs to premium rate numbers. It also sends information such as “SMS content, phone calls OS type, SDK version, IMEI number, IMSI number, location information etc.” to remote server.

.Android.Geimini.A: Android’s botnet, which comes in bundle with popular and legitimate Android application gains root privilege. It transfers the information from the device to a remote location and it uses HTTP POST method for posting data. For example it sends a victim’s geographic location and controls his/her phone remotely.

.Android.GoldDream.B: It creates logs of the incoming SMS messages and outgoing message and calls, and uploads them to a certain web site. It comes with seemingly legitimate games application and which is re-packaged to include malicious code. It sends information such as “SMS content, phone calls OS type, SDK version, IMEI number, IMSI number, location information etc.”

Leave a reply


Categories

FRIDAY, SEPTEMBER 22, 2017

Featured

Archives

Latest Comments

Social Networks