Connect with us

Hi, what are you looking for?

HEADLINES

Old Android devices at risk from automatically downloaded and executed malware

While observing the activity of several cybercriminal groups, Kaspersky Lab researchers have spotted unusual activity in a malicious script, on an infected website, which is putting Android users at risk.

While observing the activity of several cybercriminal groups, Kaspersky Lab researchers have spotted unusual activity in a malicious script, on an infected website, which is putting Android users at risk. 

Android

The script usually activates the download of Flash exploits, to attack Windows-users. The script is a set of special instructions for execution in the browser, embedded in the code of the infected website.

However at some point it has been changed so it can check the type of device its victims are using, searching specifically for Android version 4 and older. Spotting the danger, Kaspersky Lab experts decided to delve deeper.

Infecting an Android device is much harder for criminals then infecting a Windows PC. The Windows OS – and a lot of widespread applications for it – contains vulnerabilities that allow malicious code to be executed without any interactions with a user.

Advertisement. Scroll to continue reading.

This is not generally the case with the Android OS, as any application installation requires confirmation from the owner of an Android device. However, vulnerabilities in the OS can be exploited to bypass this restriction. And, as our researchers discovered during their investigation, this does happen.   

The first script was discovered while it was looking for devices operating on the old versions of Android OS. Two more suspicious scripts were also detected subsequently.

The first one is able to send an SMS to any mobile number, while the other creates malicious files on the SD-card of the attacked device. That malicious file is a Trojan, and it has the ability to intercept and send SMS messages.

Both malicious scripts are able to perform actions independently from the Android user: you would only need to occasionally visit an infected website, to be compromised.

This was made possible because cybercriminals have utilized exploits to several vulnerabilities in Android versions 4.1.x and older – CVE-2012-6636, CVE-2013-4710 and CVE-2014-1939 in particular.

Advertisement. Scroll to continue reading.

All three vulnerabilities were patched by Google between 2012 and 2014; but the risk of their exploitation still exists.

For example, because of the Android ecosystem characteristics, many vendors producing Android-based devices are releasing the necessary security updates too slowly. Some don’t release updates at all because of the technical obsoleteness of a particular device model.

“The exploitation techniques we’ve found during our research were nothing new but borrowed from proof of concepts, previously published by white hat researchers. This means that vendors of Android devices should account for the fact that the publication of PoCs would inevitably lead to the appearance of “armed” exploits. Users of these devices deserve to be protected with corresponding security updates, even if the devices are no longer being sold at the time,” said Victor Chebyshev, security expert at Kaspersky Lab.

In order to protect yourself from drive-by attacks, Kaspersky Lab experts advise the following:

  • Keep your Android-based device software up-to-date by enabling the automatic updates function;

  • Restrict the installation of applications from alternative sources to Google Play, especially if you’re managing a collection of devices used in corporate networks;

  • Use a proven security solution. Kaspersky Internet Security for Android and Kaspersky Security for Mobile with Mobile Device Management are capable of detecting changes on the SD-card of device in real time, and thus protects users against the drive-by attacks described above.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

When compared to 2023, Sophos saw a 51% increase in abusing “Living off the Land” binaries or LOLbins; since 2021, it’s increased by 83%.

HEADLINES

Someone illegally acquires or uses personal information such as bank account or credit card numbers of another person to obtain money, goods or services....

HEADLINES

To stay ahead of these challenges, organizations need to invest in AI-driven defenses, transition to quantum-safe encryption, and adopt a Zero Trust approach to...

HEADLINES

There was a 121% Year-on-Year (YoY) increase in identity fraud in 2024 across the region, with significant surges recorded in Singapore (207%), Thailand (206%)...

White Papers

The survey found that CXO’s feel less prepared than their global peers. Less than half or 48% in APAC said they felt completely prepared...

HEADLINES

On average, a single organization in the Philippines experiences 4,003 attacks per week, significantly higher than the APAC average of 2,870 attacks per week.

White Papers

Exploiting this vulnerability, cybercriminals craft deceptively authentic phishing emails that align with current trends, exploiting human emotions to invoke urgency and trick recipients into...

HEADLINES

As the year 2024 draws to a close, cybersecurity solutions provider Fortinet unveiled predictions that expect hackers will leverage as well as trends that...

Advertisement