Full Disclosure mailing list archives
New Android Malware Botnet Reversed/Uncovered
From: "Adam Behnke" <adam () infosecinstitute com>
Date: Fri, 10 Feb 2012 12:56:17 -0600
Hello, one of InfoSec Institute's security researchers reverse engineered a new botnet that is active for the Android platform. RootSmart has some unique features that make it newsworthy: . Takes advantage of Gingerbreak exploit to take control of Android device . The main malware payload is a rootkit that hides itself inside of legit app . The rootkit hooks itself into the legit app as a boot service . The rootkit installs its own shell into the OS, allowing it to silently install other packages . Encrypts the C&C URLs with a clever non-standard communication stream RootSmart is a successful botnet in the wild, between 10,000 and 30,000 devices are currently infected per Symantec. We were also able to uncover the C&C server locations, they are currently active and residing in China. More details are available here: http://resources.infosecinstitute.com/rootsmart-android-malware/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- New Android Malware Botnet Reversed/Uncovered Adam Behnke (Feb 10)
