Original Link
Windows Mobile trojan sends unauthorized information and leaves device vulnerable
Tuesday February 26, 2008 at 1:13 am CST
Posted by Jimmy Shah
Trackback
A Window Mobile PocketPC trojan that disables Windows Mobile application installation security has been discovered in China.
WinCE/InfoJack sends the infected device’s serial number, operating system and other information to the author of the trojan. It also leaves the infected mobile device vulnerable by allowing silent installation of malware. The trojan modifies the infected device’s security setting to allow unsigned applications to be installed without a warning.
The trojan was packed inside a number of legitimate installation files and distributed widely. It has been distributed with Google Maps, applications for stock trading, and a collection of games.
Figure 1
The trojan is installed with a collection of legitimate games.
WinCE/InfoJack was created by a specific website. The website may have hired someone to create the trojan and distribute it to other sites. The maintainer of the website claims that the software was just necessary to collect information on the types of mobiles used to access their site. That would be easier to believe if they had notified the user prior to installation or if they had provided some sort of uninstallation method.
Figure 2
WinCE/InfoJack installs silently along with other applications.
WinCE/InfoJack has a number of features that show its malicious intent:
* installing as an autorun program on the memory card
* installing itself to the phone when an infected memory card is inserted
* protecting itself from deletion, copying itself back to disk
* replaces the browser’s home page
* allows unsigned applications to install without warning
Figure 2 Figure 2
WinCE/InfoJack installs as an autorun program on the memory card.
That last feature, allowing silent installation of an unsigned app, is used by WinCE/InfoJack to auto update itself. It also leaves the mobile open to other malware being installed silently. Fortunately the trojan’s website is no longer reachable, due in part to an investigation by local law enforcement.
I posted about this yesterday.
http://forum.xda-developers.com/showthread.php?t=372699
virus???
that sounds bad
Related
My situation:
In my company we have about 30+ handsets currently running Android (standard and custom ROMs from XDA). The handsets include HTC Desire HD, HD2, Desire S and Desire Z. The users cannot be trusted not to brick the phones if they are allowed to download apps and modify them in anyway (not to mention they are business phones so shouldn't have facebook etc on them any way).
I've heard about admin tools which allow control of handsets remotely.
Requirements:
So, if possible, what i would like does something along the lines of...:
1: Blocks further apps from being added to the handset without a password
2: A lock to keep as many of the settings as is originally provided (wallpaper etc)
3: A master admin tool which i can remotely manage all the handsets from (download requested and approved apps, wipe, lock, locate and reset the phones if lost...etc)
What i have done before to stop the users adding further apps is register my email address to Android Market on all the phones, then changed the password using my desktop). While this stops new apps from being downloaded from the market, it does mean i cannot remotely roll out approved apps as they are no longer signed in to the account.
Is there anything out there which does any/all/some of the above?
Is there one tool which can manage all these tasks? Or will it have to be seperate apps like Norton Mobile Security (such as) etc?
Can anyone get their heads around this?
Thanks!
The market lets you download apps to a phone.
Lookout Security does all of the security tasks you want.
Thanks, that would take care of the remote wiping, locating and locking.
Does Android provide any corporate setup for administration of lots of handsets? Surely this is a niche in the market for some devs to jump on if there isn't something like that already.
And i know Android Market allows you to remotely download apps to multiple phones but i want to make it impossible to download through the phone itself. (so i can add apps but the user can't)
Something that performs like MFormation Enterprise Manager but avoiding the $20k price tag! (a tall order i know)
Sonic_Sonar said:
Something that performs like MFormation Enterprise Manager but avoiding the $20k price tag! (a tall order i know)
Click to expand...
Click to collapse
Hello,
Have you found any apps that fit your needs? Do you use them? If no, is your organization still interesting in mobile device management service?
I'm asking because I'm working for http://bloove.com (personal phone management service) and we're going to expand our offer to small and medium companies.
This new service will combine existing contact, sms, phone log and bookmark backup for personal phone with MDM features like centralized app management, location and wipe service etc.
We're looking for early adopters who will have a chance to add their custom requirements to the service and get this service for free for up to six months.
Please let me know if you're interested and want to discuss this further.
Thank you,
Rostislav
[email protected]
Please use the Q&A Forum for questions Thanks
Moving to Q&A
I did something like this ...
I first installed openssh server, plus a script that checks a specific URL for remote access needs (had to do it that way since my carrier blocks connections on all ports).
The server side is a simple php script that you call like this: check.php?deviceid=[ID]. The script checks a DB to see if there is anything new for that device ID and acts accordingly. I implemented three features: Tunnel, Script, Install APK. So, If I want to install an APK to all devices, I just upload it on our webserver, and on the MySQL DB I add devices id = all, action=install, file=/apks/whatever.apk. If, for instance, I want to do something more complex on certain devices, I add: id = all, action=script, file=/apks/whatever.sh. I write the script, then all phones check for updates on this check.php every 5 minutes, if they find a script, they'll download and execute. If it's an APK, they'll download and install. If I insert a line with deviceID=[deviceid], action=tunnel, file=[PORT NUMBER], then the phone will SSH into a remote server and do a reverse port forward, on [PORT NUMBER]. Then I can just SSH into localhost:[PORTNUMBER] on the server, and I'll have a terminal inside the phone to do whatever I need.
This doesn't address the restrictions issue, but it does allow you to control the phones however you want.
Regards,
Almafuerte.
VirusSeeker is a comprehensive free mobile security solution for smartphones which consists of antivirus and antitheft features. VirusSeeker helps protecting your mobile and its data from latest malware, spyware and viruses thus keeping it safe and secure. It also helps you to locate and lock your mobile when it is lost or stolen. This mobile security solution has one of the fastest antivirus scanners, which is capable of scanning your mobile in less than 20 seconds.
Features:
1. Real Time Scanning:
• Ensures your mobile is secure at all times.
• Scans an application as soon as it is installed on your mobile, irrespective of the way it is installed via either bluetooth, internet, e-mail, data cable or google play.
2. Antivirus:
• Enables you to scan your entire mobile or any selected application within seconds.
• Uses one of the fastest antivirus scanners, thus saving you precious time.
• It also allows you to schedule a scan to run once a day at a specific time.
• Has an update feature which ensures the mobile database is kept up to date.
3. App Checker (NEW!)
• It makes you aware of all those application installed on your mobile, that are capable of performing certain operations that can misuse or cause damage to your mobile and the data on it.
• It tells you how each application can and may misuse the data of your mobile or be cause harm to it.
• It helps you identify potentially malicious applications.
• It also provides a feature to mark a well-known application as trusted, thus not displaying it on further runs of App Checker.
• This helps keeping the mobile safe and secure.
4. Anti-Theft
• It helps you locate and lock your mobile when it is lost or stolen.
• It enables you to remotely turn ON the mobile’s GPS and have the device send its location as well as the “APPROXIMATE ADDRESS” of where the mobile is, thus making it very easy for you to find you’re mobile.
• It also enables you to remotely lock the mobile, so that no one can access any data or use the mobile. This keeps your data completely safe and secure.
5. SIM-Card Change Notification
• In the case your mobile is stolen, and the thief changes the SIM Card, the mobile immediately notifies you of the SIM Card’s new number.
6. Dashboard
• Has a very user friendly dashboard which tells you about the security status of the mobile.
• It tells you whether the Database is up to date or not, whether scanning is being regularly performed and whether the antitheft details are filled or not. It also tells you whether the mobile is completely secure or not.
7. Statistics
• Tells you the current statistics about your mobile such as the number of files scanned till date, the number of viruses detected, the date the antivirus was last run on, the date App Checker was last run on and the date update was last run on.
compatibility V2.2 And v2.3
Download it from here
https://play.google.com/store/apps/details?id=avsolution.version1
Please add in the list if you know about any virus that may effect Android OS :thumbup:
Here are list of various virus/malware/worms that effect your Android:
¤Gingermaster : A trojan
developed for an Android
platform that propagates by
installing applications that
incorporate a hidden malware
for installation in the
background. It exploits the
frailty in the version Gingerbread
(2.3) of the operating system to
use super-user permissions by
privileged escalation. Then it
creates a service that steals
information from infected
terminals (user ID, number SIM,
phone number, IMEI , IMSI,
screen resolution and local time)
by sending it to a remote server
through petitions HTTP .
¤DroidKungFu: A trojan
content in Android applications,
which when executed, obtains
root privileges and installs the
file com.google. ssearch.apk,
which contains a back door that
allows files to be removed, open
home pages to be supplied, and
'open web and download and
install' application packages. This
virus collects and sends to a
remote server all available data
on the terminal.
List would be updated as soon as possible
Please add in the list if you know about any virus that may effect Android OS :thumbup:
Sent from my GT-S5302 using xda app-developers app
You forgot to copy/paste the rest from here:
http://en.wikipedia.org/wiki/Mobile_virus
:silly:
/Closed
190704 - WhatsApp installs new rootkit, yet undetected by all major security softwares
https://zenosloim.blogspot.com/2019/07/190704-whatsapp-installs-new-rootkit.html
You thought WhatsApp has solved its "exploits" used by state intelligence communities from USA, Great Britain, Australia, Canada, New Zealand and Israel?
Nope.
You can also wonder if it was an exploit, or an "actively tolerated" backdoor ordered by NSA, GCHQ.
And "developed" with Israeli programmers support.
In any case, between 27 of june 2019 and 1 of july 2019, I managed to neutralize and identify a new type of Android rootkit, which was completely undetected by Symantec, Kaspersky, Avast/AVG, ESET.
The rootkit was detected by an indirect method which I will describe here. And eliminated also.
However, THANK YOU, USA, UK, Canada, Australia, New Zealand and especially Israel for the honour accorded to my person, and my swedish phone number: +46 720 329614.
I will technically describe how I detected and eliminated the rootkit, so that your programmers will "correct" the mistakes done, and improve your rootkit for better undetected use.
Same rootkit is also spread packaged with various popular softwares, made available via a "curiously tolerated by US authorities" piracy site, "forum.mobilism.org".
Used devices:
Motorola G6 Plus rooted with latest Magisk, Xposed;
Windows Desktop PC
Windows Software:
Symantec Endpoint Protection
Android Softwares:
Kaspersky Mobile Antivirus AppLock & Web Security
Avast Antivirus Mobile Security & Virus Cleaner
ESET Mobile Security & Antivirus
Marcel Bokhorst NetGuard Pro
3C Battery Monitor Widget Pro
GSam Labs GSam Battery Monitor Pro
Install all needed softwares above.
Configure NetGuard Pro to block anything on Mobile Data and WiFi.
Install/reinstall WhatsApp or some of the softwares "released" on "forum.mobilism.org" between 27 june 2019 and 30 june 2019.
Assume your person is an "interesting profile" for The 5 Eyes Community (US+UK+CA+AU+NZ) or Israel.
It's enough your number is called or you make just one call.
Open WiFi. Keep it open few minutes. Then close WiFi.
Wait at least 12 hours, do not use the phone or the WiFi in it.
The rootkit will trigger itself, trying to send the logged data from your device.
There is a "bug" in the rootkit which will do the following: if it can not send logged data for at least 12 hours, because it is blocked by firewall (used latest version actual for the time period named - possible the author to be "bought" by the affected 5 Eyes + Israel - not sure if future versions will successfully block the rootkit), the rootkit will infect the process "com.motorola.modemservice", in practice "hammering" the phone modem, to be able to force-sending via mobile data, the logged data.
Not being able, this "hammering" will result in an indirect higher power consumption, detected by both 3C Battery Monitor Widget Pro and GSam Labs GSam Battery Monitor Pro.
Connect the phone to PC, and do a complete device scan via adb with Symantec Endpoint Protection.
As you guessed, Symantec being a US registered company, it will detect nothing.
Now do same full device scan (apps, apks, files, processes, memory) with ESET.
ESET is Slovakia native, but operates in USA, hence do not expect to detect something, confirmed.
Do not expect they will make public the evidence registered from my phone.
Now do same full device scan with Avast/AVG.
Czechia native, operating in USA, same result as ESET, nothing detected.
Do not expect they will make public the evidence registered from my phone.
Now the interesting part, use latest Kaspersky Mobile Antivirus AppLock & Web Security.
Unfortunately, Kaspersky is not able to detect the rootkit.
I do hope that Kaspersky will inspect their logs and identify my Motorola G6 Plus scanned by them, to create an identifying signature for the rootkit.
All evidence exists registered at Kaspersky.
So, no actual security software for Windows or Android was able to detect the rootkit.
Clear sign it is a new developed cyberweapon by USA, UK, CA, AU, NZ and Israel.
Eliminating the rootkit.
As no software was able to detect it, only solution was a factory reset of the phone.
Disabled automatically update/install from Google Play to avoid auto reinstalling previous installed softwares, including WhatsApp.
Be very cautious when installing pirated softwares from "forum.mobilism.org", the fact they are "tolerated" by USA authorities, says a lot.
Thinking of "Piracy", "Double Moral", "Money Laundering", "Criminal activities on internet", think of 2 things:
Who are the main "remained tax paradises" ? Mostly USA and UK colonies. (according to United Nation and Interpol statistics)
Which countries receive with open arms "fugitives tax-payers and money lounderers" as "strategic investors" ? UK, Israel. (according to United Nation and Interpol statistics)
This is double moral.
Hi,
Does anyone know about a scanner for apks that is able to fulfill these requirements:
1) It needs to give a "malware score" somehow. It could be just safe/unsafe, good/bad, etc. But It needs to distinguish malware from benign apps automatically.
2) It can be automatic, e.g. through API so that thousands of files can be analyzed with it.
3) Not an app, must work for a server/desktop