SlideShare a Scribd company logo
1#Choice
of DIGITAL
WORLD
Enterprise Security
An ISO 27001 Certified Company www.escanav.com
Latest Android Malware
can Eavesdrop and
Access Contacts List
A group of sophisticated hackers have targeted Android phones of Israeli Defense personnel
by developing a malware named ViperRAT that has spying functions exposing the vital and
sensitive whereabouts of the soldiers to the sly enemies. This malware has been specifically
created to hijack Israeli soldiers’ Android devices and remotely siphon off valuable data like
photos, designs or audio recordings directly from the compromised devices. Adding to the
woes, it can even access the contact list, read text messages or eavesdrop conversations.
According to the investigation, the defense personals were lured with social engineering
techniques – mainly via honey traps from countries like Canada, Germany and Switzerland
in Facebook messenger. The soldiers were conned into installing a Trojan version of
apparently legitimate Android chat app for better engagement into adult conversation.
Once the app is downloaded and installed in the smart phones, it pretends as an update for
an already installed app and tricks the victims to permit the update to carry out the
surveillance. Apparently the victims feel that they will be able to get close to those women
and ultimately get preyed.
According to researchers, the hackers successfully established a widespread cyber
espionage campaign with ViperRAT malware by taking hostage of a good number of mobile
devices of popular brands belonging to more than 100 Israeli soldiers. This malware
gathered a wide range of data from the compromised devices including Geo location, call
logs, images, SMS, network and device meta data, internet browsing history and app
download status.
This malware is still keeping the defense and security personals on toes and imposing
stringent guidelines for the soldiers to stay away from any further miscreant. eScan agrees
with such set of guidelines which asks every individuals not to download any app without
any proper verification. They need to crosscheck the authenticity with the help of reputed
sources and anything unusual should be dropped immediately. It was even suggested to
install a reputed mobile antivirus and regularly scan the smart phone to evaluate the
presence of any suspicious app or detect any doubtful activity.

More Related Content

What's hot

Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phone
niraj joshi
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
Er aditya kumar jha
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
Lookout
 
Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578skowshik
 
pegasus spyware
pegasus spywarepegasus spyware
Pegasus
PegasusPegasus
Pegasus
danjspaul
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysis
Andrey Apuhtin
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
Jimmy Shah
 
Phishing
PhishingPhishing
Phishing
jennifer123mora
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
guestc03f28
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
iFixScreens
 
Top 5 cases of Data Breach caused by Human Error
Top 5 cases of Data Breach caused by Human ErrorTop 5 cases of Data Breach caused by Human Error
Top 5 cases of Data Breach caused by Human Error
Cyware
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
RAVITEJA828
 
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
IBM Security
 
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
IBM Security
 
Cyber security
Cyber securityCyber security
Cyber security
SanthoshKumar2614
 
Viruses, Biometrics, & Encryptions
Viruses, Biometrics, & EncryptionsViruses, Biometrics, & Encryptions
Viruses, Biometrics, & Encryptionsguest9850e5
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
preetpatel72
 

What's hot (18)

Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phone
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578
 
pegasus spyware
pegasus spywarepegasus spyware
pegasus spyware
 
Pegasus
PegasusPegasus
Pegasus
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysis
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Phishing
PhishingPhishing
Phishing
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
 
Top 5 cases of Data Breach caused by Human Error
Top 5 cases of Data Breach caused by Human ErrorTop 5 cases of Data Breach caused by Human Error
Top 5 cases of Data Breach caused by Human Error
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
 
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
 
Cyber security
Cyber securityCyber security
Cyber security
 
Viruses, Biometrics, & Encryptions
Viruses, Biometrics, & EncryptionsViruses, Biometrics, & Encryptions
Viruses, Biometrics, & Encryptions
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 

Similar to Spy android malware - eScan

Smartphone
SmartphoneSmartphone
Smartphone
Naval OPSEC
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
Kavita Rastogi
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
Nagarro
 
HinDroid
HinDroidHinDroid
HinDroid
HinDroid
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
Innovation Network Technologies: InNet
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
Null pune 1st March-news bytes
Null pune 1st March-news bytesNull pune 1st March-news bytes
Null pune 1st March-news bytes
n|u - The Open Security Community
 
Securing-Your-Smartphone.pdf
Securing-Your-Smartphone.pdfSecuring-Your-Smartphone.pdf
Securing-Your-Smartphone.pdf
SergioFaulhaber
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSPurna Bhat
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
Anjoum .
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
Commonwealth Telecommunications Organisation
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
AGILLY
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
Quick Heal Technologies Ltd.
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOS
Priyanka Aash
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
n|u - The Open Security Community
 
unit 2.pptx
unit 2.pptxunit 2.pptx
unit 2.pptx
ThangamaniR3
 

Similar to Spy android malware - eScan (20)

Smartphone
SmartphoneSmartphone
Smartphone
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
HinDroid
HinDroidHinDroid
HinDroid
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
Mobile security
Mobile securityMobile security
Mobile security
 
Null pune 1st March-news bytes
Null pune 1st March-news bytesNull pune 1st March-news bytes
Null pune 1st March-news bytes
 
Securing-Your-Smartphone.pdf
Securing-Your-Smartphone.pdfSecuring-Your-Smartphone.pdf
Securing-Your-Smartphone.pdf
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOS
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
unit 2.pptx
unit 2.pptxunit 2.pptx
unit 2.pptx
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 

Spy android malware - eScan

  • 1. 1#Choice of DIGITAL WORLD Enterprise Security An ISO 27001 Certified Company www.escanav.com Latest Android Malware can Eavesdrop and Access Contacts List
  • 2. A group of sophisticated hackers have targeted Android phones of Israeli Defense personnel by developing a malware named ViperRAT that has spying functions exposing the vital and sensitive whereabouts of the soldiers to the sly enemies. This malware has been specifically created to hijack Israeli soldiers’ Android devices and remotely siphon off valuable data like photos, designs or audio recordings directly from the compromised devices. Adding to the woes, it can even access the contact list, read text messages or eavesdrop conversations. According to the investigation, the defense personals were lured with social engineering techniques – mainly via honey traps from countries like Canada, Germany and Switzerland in Facebook messenger. The soldiers were conned into installing a Trojan version of apparently legitimate Android chat app for better engagement into adult conversation. Once the app is downloaded and installed in the smart phones, it pretends as an update for an already installed app and tricks the victims to permit the update to carry out the surveillance. Apparently the victims feel that they will be able to get close to those women and ultimately get preyed. According to researchers, the hackers successfully established a widespread cyber espionage campaign with ViperRAT malware by taking hostage of a good number of mobile devices of popular brands belonging to more than 100 Israeli soldiers. This malware gathered a wide range of data from the compromised devices including Geo location, call logs, images, SMS, network and device meta data, internet browsing history and app download status.
  • 3. This malware is still keeping the defense and security personals on toes and imposing stringent guidelines for the soldiers to stay away from any further miscreant. eScan agrees with such set of guidelines which asks every individuals not to download any app without any proper verification. They need to crosscheck the authenticity with the help of reputed sources and anything unusual should be dropped immediately. It was even suggested to install a reputed mobile antivirus and regularly scan the smart phone to evaluate the presence of any suspicious app or detect any doubtful activity.