SlideShare a Scribd company logo
1 of 3
Download to read offline
1#Choice
of DIGITAL
WORLD
Enterprise Security
An ISO 27001 Certified Company www.escanav.com
Latest Android Malware
can Eavesdrop and
Access Contacts List
A group of sophisticated hackers have targeted Android phones of Israeli Defense personnel
by developing a malware named ViperRAT that has spying functions exposing the vital and
sensitive whereabouts of the soldiers to the sly enemies. This malware has been specifically
created to hijack Israeli soldiers’ Android devices and remotely siphon off valuable data like
photos, designs or audio recordings directly from the compromised devices. Adding to the
woes, it can even access the contact list, read text messages or eavesdrop conversations.
According to the investigation, the defense personals were lured with social engineering
techniques – mainly via honey traps from countries like Canada, Germany and Switzerland
in Facebook messenger. The soldiers were conned into installing a Trojan version of
apparently legitimate Android chat app for better engagement into adult conversation.
Once the app is downloaded and installed in the smart phones, it pretends as an update for
an already installed app and tricks the victims to permit the update to carry out the
surveillance. Apparently the victims feel that they will be able to get close to those women
and ultimately get preyed.
According to researchers, the hackers successfully established a widespread cyber
espionage campaign with ViperRAT malware by taking hostage of a good number of mobile
devices of popular brands belonging to more than 100 Israeli soldiers. This malware
gathered a wide range of data from the compromised devices including Geo location, call
logs, images, SMS, network and device meta data, internet browsing history and app
download status.
This malware is still keeping the defense and security personals on toes and imposing
stringent guidelines for the soldiers to stay away from any further miscreant. eScan agrees
with such set of guidelines which asks every individuals not to download any app without
any proper verification. They need to crosscheck the authenticity with the help of reputed
sources and anything unusual should be dropped immediately. It was even suggested to
install a reputed mobile antivirus and regularly scan the smart phone to evaluate the
presence of any suspicious app or detect any doubtful activity.

More Related Content

What's hot

Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phoneniraj joshi
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578skowshik
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisAndrey Apuhtin
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!iFixScreens
 
Top 5 cases of Data Breach caused by Human Error
Top 5 cases of Data Breach caused by Human ErrorTop 5 cases of Data Breach caused by Human Error
Top 5 cases of Data Breach caused by Human ErrorCyware
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile networkRAVITEJA828
 
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014IBM Security
 
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013IBM Security
 
Viruses, Biometrics, & Encryptions
Viruses, Biometrics, & EncryptionsViruses, Biometrics, & Encryptions
Viruses, Biometrics, & Encryptionsguest9850e5
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 

What's hot (18)

Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phone
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578
 
pegasus spyware
pegasus spywarepegasus spyware
pegasus spyware
 
Pegasus
PegasusPegasus
Pegasus
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysis
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Phishing
PhishingPhishing
Phishing
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
 
Top 5 cases of Data Breach caused by Human Error
Top 5 cases of Data Breach caused by Human ErrorTop 5 cases of Data Breach caused by Human Error
Top 5 cases of Data Breach caused by Human Error
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
 
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
 
Cyber security
Cyber securityCyber security
Cyber security
 
Viruses, Biometrics, & Encryptions
Viruses, Biometrics, & EncryptionsViruses, Biometrics, & Encryptions
Viruses, Biometrics, & Encryptions
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 

Similar to Spy android malware - eScan

Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionNagarro
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
Securing-Your-Smartphone.pdf
Securing-Your-Smartphone.pdfSecuring-Your-Smartphone.pdf
Securing-Your-Smartphone.pdfSergioFaulhaber
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSPurna Bhat
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient TruthAGILLY
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSPriyanka Aash
 

Similar to Spy android malware - eScan (20)

Smartphone
SmartphoneSmartphone
Smartphone
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
HinDroid
HinDroidHinDroid
HinDroid
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
Mobile security
Mobile securityMobile security
Mobile security
 
Null pune 1st March-news bytes
Null pune 1st March-news bytesNull pune 1st March-news bytes
Null pune 1st March-news bytes
 
Securing-Your-Smartphone.pdf
Securing-Your-Smartphone.pdfSecuring-Your-Smartphone.pdf
Securing-Your-Smartphone.pdf
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOS
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
unit 2.pptx
unit 2.pptxunit 2.pptx
unit 2.pptx
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 

Recently uploaded

Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsChandrakantDivate1
 
Mobile Application Development- Configuration and Android Installation
Mobile Application Development- Configuration and Android InstallationMobile Application Development- Configuration and Android Installation
Mobile Application Development- Configuration and Android InstallationChandrakantDivate1
 
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pureBromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pureamy56318795
 
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样AS
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsChandrakantDivate1
 
Abortion pills in Riyadh+966572737505 cytotec jeddah
Abortion pills in Riyadh+966572737505 cytotec jeddahAbortion pills in Riyadh+966572737505 cytotec jeddah
Abortion pills in Riyadh+966572737505 cytotec jeddahsamsungultra782445
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312wphillips114
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesChandrakantDivate1
 

Recently uploaded (9)

Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
Mobile Application Development- Configuration and Android Installation
Mobile Application Development- Configuration and Android InstallationMobile Application Development- Configuration and Android Installation
Mobile Application Development- Configuration and Android Installation
 
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pureBromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
 
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
Abortion pills in Riyadh+966572737505 cytotec jeddah
Abortion pills in Riyadh+966572737505 cytotec jeddahAbortion pills in Riyadh+966572737505 cytotec jeddah
Abortion pills in Riyadh+966572737505 cytotec jeddah
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 

Spy android malware - eScan

  • 1. 1#Choice of DIGITAL WORLD Enterprise Security An ISO 27001 Certified Company www.escanav.com Latest Android Malware can Eavesdrop and Access Contacts List
  • 2. A group of sophisticated hackers have targeted Android phones of Israeli Defense personnel by developing a malware named ViperRAT that has spying functions exposing the vital and sensitive whereabouts of the soldiers to the sly enemies. This malware has been specifically created to hijack Israeli soldiers’ Android devices and remotely siphon off valuable data like photos, designs or audio recordings directly from the compromised devices. Adding to the woes, it can even access the contact list, read text messages or eavesdrop conversations. According to the investigation, the defense personals were lured with social engineering techniques – mainly via honey traps from countries like Canada, Germany and Switzerland in Facebook messenger. The soldiers were conned into installing a Trojan version of apparently legitimate Android chat app for better engagement into adult conversation. Once the app is downloaded and installed in the smart phones, it pretends as an update for an already installed app and tricks the victims to permit the update to carry out the surveillance. Apparently the victims feel that they will be able to get close to those women and ultimately get preyed. According to researchers, the hackers successfully established a widespread cyber espionage campaign with ViperRAT malware by taking hostage of a good number of mobile devices of popular brands belonging to more than 100 Israeli soldiers. This malware gathered a wide range of data from the compromised devices including Geo location, call logs, images, SMS, network and device meta data, internet browsing history and app download status.
  • 3. This malware is still keeping the defense and security personals on toes and imposing stringent guidelines for the soldiers to stay away from any further miscreant. eScan agrees with such set of guidelines which asks every individuals not to download any app without any proper verification. They need to crosscheck the authenticity with the help of reputed sources and anything unusual should be dropped immediately. It was even suggested to install a reputed mobile antivirus and regularly scan the smart phone to evaluate the presence of any suspicious app or detect any doubtful activity.