Gadgets Magazine

Deadly Mobile Malware Threat of 2012

Posted on the 28 January 2013 by Janeandrew01

Where the year 2012 saw various innovative gadgets and new cellular technology, there has been drastic increase in malware threats in both computers and mobiles. Cybercrimes have been on a rise with hackers inventing new ways of infiltrating smartphones. Be it a secured platform of iOS or compromised OS frequently threatened by Android spyware and other malware. Let’s have a look at some most dangerous and sophisticated malware which appeared in 2012.

1.NotCompatible

In April 2012, Lookout Mobile Security discovered this form of malware in cell phones. Lookout’s security researchers informed that this was the first ever malware that carefully picks its targets, infiltrates and spreads the malware through them. The modus operandi of this malware is very simple – they target through a website and when an Android phone user visits the infected site, it stealthily creeps into the smartphone. Sometimes it props up as a security update, which the unaware user downloads. Once it is successfully installed in an Android device, it can turn them into a network proxy to gain access to hidden and confidential information or data.

2.SMSZombie

SMSZombie is another malicious malware which was discovered in China after it infected more than 500,000 devices. This malware takes help of third-party proxy to infiltrate and spread its tentacles. SMSZombie spreads through China Mobile’s online payment system. An SMS is sent to the top-up accounts of China Mobile, which contains the malware. The information in the message is completely controlled by the malware developer in order to protect its identity. Once this malware is installed in the device, it is extremely difficult to remove it, since it takes the responsibility of the admin. The Android malware will extract the entire data in the device, while the user is unaware of its existence.

3.LENA

This is quite a smart malware, which penetrates into the device without making the user aware of its existence and activities. This usually happens by exploiting Gingerbread version of Android OS. Once the malware has entered the system, it would start behaving like a monitoring software and inform the source of every data and activity performed in the device. LENA is also capable of downloading additional components and update installed binaries.

4.   LuckyCat

LuckyCat is the name of the campaign developed by hackers which attacked a number of organisations and groups including Tibetan activists and factories in Japan. In 2012, the attackers targeted the Android platform for more organized and malicious attacks. Once the application is installed, a black icon appears on the screen with the text “testService”, which gives passage to the malware to enter the device and steal important data and information. The malware acts like a Trojan horse and attacks the device in shape of an Android application.

5.   NETISEND

Last, but not the least, NETISEND which is a malware that has been cause of a considerable number of device hacking and data theft. This information stealer can extract important information like IMEI, IMSI, information related to the device and applications installed in it.

//


Back to Featured Articles on Logo Paperblog

Paperblog Hot Topics

Magazines