Feeds

Chinese mobile users targeted by Trojan

Smart mobile malware

Beginner's guide to SSL certificates

Miscreants have created a ransomware Trojan for mobile phones which has been seen in the wild in China. Kiazha-A, attempts to extort money from users of Symbian Series 60 phones.

Infected smartphones display a message saying that victims need to send RMB 50 ($7) to the malware authors in order to regain use of the phone. The message (roughly translated) states: "Warning: Your device has been affected, please prepare a recharge card of RMB 50 yuan and connect QQ[id removed] account, or your phone will be paralysed!!!"

QQ is a popular instant messaging network in China that's become the target of many password stealing Trojans and scams over recent months. The network supports its own currency, called QQ coins, that can be traded.

An analysis by anti-virus firm McAfee has found that Kiazha-A is a component of a sophisticated mobile malware bundle, dubbed MultiDropper-CR. SMS messages on infected devices are controlled by hackers to set up an elaborate scam, McAfee explains. Initial infection is spread via either Bluetooth or tainted MMS messages from other infected devices.

"MultiDropper-CR uses malicious payloads (Beselo, Commwarrior) to convince the user their phone is infected. It also sets up SMS forwarding (SmsSend-G) to collect information and potentially passwords. In case the victim doesn’t have a QQ account the malware will order (SmsSend-F) one for them. After all that, Kiazha-A deletes SMS messages to cover its tracks and displays the offer to fix the user’s phone for a small fee," writes McAfee anti-virus analyst Jimmy Shah.

Multidroppers are usually put together by miscreants using components they haven't created themselves, a pattern repeated with the Kiazha money-making scam. "It appears that the author, with a lot of effort and testing, put together various malware like pieces from a toolkit, Shah adds.

China has become a hotspot of mobile malware of late. Last month a Trojan capable of infecting mobile devices running Windows CE surfaced in the republic.

The InfoJack Trojan is spread by either tricking mobile users into installing seemingly legitimate application installation files (that posed as stock trading apps or games, for example) or if punters inadvertently use an infected memory card on vulnerable devices.

The malware disabled Windows Mobile application installation security, allowing further malware components to be surreptitiously installed without user intervention or knowledge. InfoJack sent the infected device's serial number, operating system, and other information to the author of the Trojan. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.