The Latest in IT Security

USB Autorun Attack


New malware emerged recently attacking Android and Windows platforms.
Main capabilities: Steals information and downloads files
File size: 330,984 bytes
File type: APK

This malware comes up being a system solution that assists with accelerating your system. Right after set up, it displays an image launcher.
After the harmful application is launched, the user will discover its homescreen.
The application offers a number of different “clean options” for the user to select, however they really practically do nothing at all other than display an activity bar.

Concurrently, the malware begins a service that is harmful throughout the background.
It signs up a location listener to gather as well as upload location details via HTTP to a server.
It additionally gets instructions from a C&C server.
The protocol utilized by the malware to communicate to the C&C server is a unique one.

The malware executes a number of functionalities, for instance:
•Send and Delete SMS messages
•Steal contact information
•Track location via GPS device
•Make phone calls
•Execute commands

Why is this malware special is the control usb-autorun-attack. Following this control the malware will down load a few files from its server and also save them withinside the SD card.
Among the files saved is a traditional Windows auto-run malware thus when the user chooses the USB setting on the cellular device and attaches with a Windows platform, the auto-run malware will operate instantly.
This auto-run is made to record voice and report to the server.

Leave a reply


MONDAY, JULY 15, 2024

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments