SlideShare a Scribd company logo
1 of 5
Download to read offline
This type of malicious program is designed for devices running
Android OS.
Implant has the ability to record calls, activate the camera and
microphone.It also has the ability to access e-mail and SMS
messages.
1
A screenshot shows how the sound is recorded.
Besides, threat actors have the ability to manipulate the camera on the device.
2
Also an interesting opportunity is to get information about contacts.
Attackers can listen to conversations through applications such as:
WatssApp
Telegram
Line
Skype
Google.Talk
WeChat
3
It is important to note that the attackers were very interested in the victim's
conversations through a telegram.
Also, attackers can get information about the calendar, and the files
contained on the victim's device ,browser history.
If victim read a text or audio message,the threat actor behind that
implant, reads it too.
MD5 39be87178c84d4afd07a80323a1d4b91
Compiled on 02/08/2017
4
5

More Related Content

What's hot

Network Security July 1
Network Security July 1Network Security July 1
Network Security July 1
Jd Mercado
 
Viruses, Biometrics, & Encryptions
Viruses, Biometrics, & EncryptionsViruses, Biometrics, & Encryptions
Viruses, Biometrics, & Encryptions
guest9850e5
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
PEC
 

What's hot (17)

Girls security abuse - social media - security tips.arise raabi - pdf
Girls security   abuse - social media - security tips.arise raabi - pdfGirls security   abuse - social media - security tips.arise raabi - pdf
Girls security abuse - social media - security tips.arise raabi - pdf
 
Network Security July 1
Network Security July 1Network Security July 1
Network Security July 1
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
KNOW THE ENEMY
KNOW THE ENEMYKNOW THE ENEMY
KNOW THE ENEMY
 
Viruses, Biometrics, & Encryptions
Viruses, Biometrics, & EncryptionsViruses, Biometrics, & Encryptions
Viruses, Biometrics, & Encryptions
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Virus
VirusVirus
Virus
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
AMMU
AMMUAMMU
AMMU
 
pegasus spyware
pegasus spywarepegasus spyware
pegasus spyware
 
Internet threats
Internet threatsInternet threats
Internet threats
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Presentation
PresentationPresentation
Presentation
 
Internet threat
Internet threatInternet threat
Internet threat
 

Similar to Implant project

When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
STO STRATEGY
 

Similar to Implant project (20)

Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
 
Android malware
Android malwareAndroid malware
Android malware
 
Android malware
Android malwareAndroid malware
Android malware
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
Most Secure Messaging Apps.pdf
Most Secure Messaging Apps.pdfMost Secure Messaging Apps.pdf
Most Secure Messaging Apps.pdf
 
File000145
File000145File000145
File000145
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
Syrian Malware
Syrian MalwareSyrian Malware
Syrian Malware
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
 
Telegram
TelegramTelegram
Telegram
 
RSA - Behind the scenes of a fake token mobile app operation
RSA - Behind the scenes of a fake token mobile app operationRSA - Behind the scenes of a fake token mobile app operation
RSA - Behind the scenes of a fake token mobile app operation
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
Telegram
TelegramTelegram
Telegram
 
HinDroid
HinDroidHinDroid
HinDroid
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
anilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
anilsa9823
 

Recently uploaded (7)

9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 

Implant project

  • 1. This type of malicious program is designed for devices running Android OS. Implant has the ability to record calls, activate the camera and microphone.It also has the ability to access e-mail and SMS messages. 1
  • 2. A screenshot shows how the sound is recorded. Besides, threat actors have the ability to manipulate the camera on the device. 2
  • 3. Also an interesting opportunity is to get information about contacts. Attackers can listen to conversations through applications such as: WatssApp Telegram Line Skype Google.Talk WeChat 3
  • 4. It is important to note that the attackers were very interested in the victim's conversations through a telegram. Also, attackers can get information about the calendar, and the files contained on the victim's device ,browser history. If victim read a text or audio message,the threat actor behind that implant, reads it too. MD5 39be87178c84d4afd07a80323a1d4b91 Compiled on 02/08/2017 4
  • 5. 5