Feeds

Malware-as-a-service picks Android apart

Dev offers crimeware roadmap to subscription customers

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Quite possibly the most expensive and capable Android malware the world has yet seen is for sale at $US5000 on underground markets, replete with software-as-a-service support.

The iBanking malware has evolved from a simple SMS-stealer to a highly capable application that records audio within the range of a device's microphone, steals contacts, and records, uploads and redirects phone calls.

iBanking could be a watershed for the mobile platform as it showcases the extent of damage possible by malware.

Blackberry appears next on the hit list for the malware's maintainer, an entity known only as "GFF" announcing a version planned for development.

Most Android malware such as the Zeus (ZITMO) banking trojan were constrained to nabbing credentials and two factor banking tokens, and could be easily removed.

With the latest upgrade made August, iBanking could access the platforms' file system, hide application code, and send SMS and prevent removal of the malware if administrator rights were enabled on the infected device.

GFF sold the expensive app to well-resourced crime gangs that received patches, updates and software support.

The serviced model was increasingly popular with virus and exploit kit writers and had ensured GFF kept paying clients after the iBanking source code was stolen and leaked online in February.

The fallout however was worse for Android users according to Symantec researchers who reported a surge in iBanking activity since the leak.

"Symantec predicts that this upsurge in activity will continue as news of the leaked source code spreads through the underground," researchers wrote in a post.

iBanking infection flow

"However, we believe that the more professional cybercrime groups will continue to pay for the product, allowing them to avail of updates, technical support and new features."

The silver lining was that the leaked and unsupported version in use by criminal pirates contained a unpatched vulnerability which may be later used by white or black hats bring down command and control servers.

There was further reprieve in that users had to accept a laundry list of permissions for full compromise to occur but that was offset by some clever infection techniques.

Infection happened over social media networks, phishing sites and via pop-up messages generated by Windows trojans. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Desperate VXers enslave FREEZERS in DDoS bot
Updated Spike malware targets Asia
Heatmiser digital thermostat users: For pity's sake, DON'T SWITCH ON the WI-FI
A stranger turns up YOUR heat with default password 1234
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.