Researchers find first Android malware targeting Gingerbread
Infected apps from Chinese download sites hijack phones running Android 2.3
Computerworld - Researchers have spotted the first malware that exploits a critical vulnerability in Android 2.3, aka Gingerbread, finding samples tucked into legitimate apps on Chinese download sites.
Earlier threats aimed at Google's Android, including the widely-distributed DroidDream and DroidDream Light, exploited bugs in older versions of the mobile operating system but were not able to hijack Gingerbread-powered smartphones.
Last Thursday, Xuxian Jiang, an assistant professor in computer science at North Carolina State University, said that his team and Beijing-based NetQin Mobile Security had identified new "high-risk" malware that can root, or completely compromise, Android 2.3.
Jiang named the malware "GingerMaster."
GingerMaster utilizes the "GingerBreak" exploit first unveiled in April, when attack code was published on the Internet, said Jiang in a blog post.
Like most Android malware, GingerMaster hides inside legitimate Android applications that attackers have pirated, added malware to, then re-released onto popular download markets.
When unsuspecting users download the infected apps, the exploit kicks into action, "rooting" the smartphone to gain complete access, harvesting personal data from the phone, including the device ID and the phone number, before sending that to a command-and-control (C&C) server maintained by the attackers.
The malware waits for further instructions from the C&C server, which can tell jacked phones to download even more malware or other apps, said Jiang.
Vanja Svajcer, a principal virus researcher with U.K.-based Sophos, confirmed Jiang's findings after uncovering a GingerMaster sample in an app that shows photos of celebrities, including Lady Gaga.
In a post to the Sophos security blog Monday, Svajcer said he had downloaded the infected app from a Chinese-language site that caters to Android owners.
Although some infected apps have slipped into Google's official Android Market, a larger number are distributed through alternate sites, including several popular Chinese app marts.
Last month, for instance, Jiang warned Android users of a then-new threat, called "HippoSMS," that his group had found on unauthorized Chinese app stores.
According to several antivirus vendors, the volume of Android malware has jumped this year.
Earlier this month, San Francisco-based Lookout Security said that the likelihood of an Android owner encountering malware shot up two-and-a-half times in the first six months of 2011.
Today, McAfee added its voice to the chorus about a rising tide of Android malware, saying in a new report (download PDF) that hackers had pushed Android into their No. 1 target by crafting more threats against that mobile OS than any other.
NC State's Jiang stressed that the newest Android malware is a significant threat, and urged smartphone owners to watch where they download apps and remain vigilant when an app requests a large number of permissions.
"Due to the fact that GingerMaster contains the most recent root exploit, we consider it poses one of the most serious threats to mobile users," Jiang said.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His e-mail address is email@example.com.
Google's Android OS
- Review: 5 video editing apps for Android
- Malware-infected Android apps spike in the Google Play store
- Nokia plans forked Android smartphone for Barcelona unveiling
- LG G Flex deep-dive review: The curious case of the curved phone
- Xperia Z1S deep-dive review: A stylish phone with power and panache
- Low-end smartphone battle forces Nokia to Android
- Moto G real-world review: The best budget phone money can buy
- Google escalates offensive against Office with Android 'KitKat'
- Galaxy Note 3 deep-dive review: A plus-sized phone with perks and quirks
- LG G2 deep-dive review: Extraordinary hardware in an ordinary phone
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Malware and Vulnerabilities White Papers | Webcasts