Detected botnet of one million smartphones

Posted: January 22, 2013 in IT Security News
Tags: , , ,

Android HackedExplorers of the site BBC, referring to the Chinese news agency Xinhua, reported the discovery of the largest to date mobile botnet, which includes more than a million smart phones belonging to the Chinese people.

Used for the rapid spread of ‘Trojan’ application that unnoticed for smartphones and tablets during the installation of new programs. After that botnet operators can remotely control a compromised device, download personal data from the memory cell phone and use it to send spam, launch denial-of-service attacks and other malicious activity.

According to experts, the ‘at risk’ were owners of the devices based on the platform Android, has a dominant position in the rapidly growing Chinese market for mobile operating systems. Android-compatible devices are traditionally considered more vulnerable than smartphones running iOS. The reason for that is the openness of the mobile platform and the absence of serious control over the applications published on the site Google Play.

Malicious applications for mobile devices can not be called an entirely new phenomenon. In 2011, experts in the field of information security discovered Android-botnet called Rootstrap, which consists of approximately 100,000 compromised devices.

VIPRE Mobile Security DiscountOne of the most thorough reports on mobile threats received from the laboratory as Damballa Labs in 2011. According to experts, even then the portable device is a very attractive target for hackers. And with the universal development initiatives ‘Bring Your Own Device’ among virus writers have additional motivation. Today many office workers use a smartphone in their daily work. This means that the memory cell phone can now be found not only valuable personal information and sensitive corporate data.

Hacker community representatives reported that writing malware for Android is not particularly difficult. Existing vulnerabilities allow ‘Trojans’ comfortably settle in the drivers cell phone. A smartphone to manage captured most commonly used protocol for exchanging SMS messages.

In the global network can find many antivirus and security features aimed at mobile platforms. Experts also advise users to exercise caution when downloading apps from unknown sources. Often find strange behavior-devices in the study of the call log. In addition to owners of smartphones do not neglect the means of data encryption, as well as special services for the management of mobile devices, such as AirWatch or Zenprise.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s