Symantec warns of Android Trojans that mutate with every download

IASI, Romania — Researchers from security vendor Symantec Corp. have identified a new premium-rate SMS Android Trojan horse that modifies its code every time it gets downloaded in order to bypass antivirus detection.

This technique is known as server-side polymorphism and has already existed in the world of desktop malware for many years, but mobile malware creators have only now begun to adopt it.

A special mechanism that runs on the distribution server modifies certain parts of the Trojan in order to ensure that every malicious app that gets downloaded is unique. This is different from local polymorphism where the malware modifies its own code every time it gets executed.

Symantec [Nasdaq: SYMC] has identified multiple variants of this Trojan horse, which it detects as Android.Opfake, and all of them are distributed from Russian websites. However, the malware contains instructions to automatically send SMS messages to premium-rate numbers from a large number of European and former Soviet Union countries.

In some cases, especially when security products rely heavily on static signatures, detecting malware threats that make use of server-side polymorphism can be difficult.

“As with malware that affects traditional computing devices, the level of sophistication of the polymorphism used can affect how easy or difficult the threat is to detect,” said Vikram Thakur, the principal security response manager at Symantec. “More complicated polymorphism requires more intelligent countermeasures.”

In the case of Android.Opfake the level of polymorphism is not very high, as only some of the Trojan’s data files are being modified by the distribution server.

“If antivirus vendors place their detection on the executable and non-changing sections, all files would be successfully detected,” said Tim Armstrong, malware researcher at Kaspersky Lab. However, if the Trojan’s executable code were also polymorphic, the challenge of detecting it would be more difficult, he said.

According to Armstrong, server-side polymorphism is not very widespread on the Android platform at the moment because most users get their apps through official channels and the current structure of the Android Market does not allow for a malware distribution scheme like this one.

However, he agrees that polymorphic Android malware could force antivirus vendors to step up their game in the future. “I think many of the features that are currently available on traditional platforms will start to arrive on these mobile platforms out of necessity as the criminals change their attack methods,” Armstrong said.

There have been many new developments on the mobile threat landscape recently and increasing their attention towards smartphones is a logical move for malware writers, because they usually go where the money is, said Jamz Yaneza, research manager at antivirus company Trend Micro.

Users should become more aware of this fact and the capabilities of their mobile devices, which are now similar to those of mobile PCs, Yaneza said. “They should treat app downloads with the same caution as they do on desktops,” and install or make use of whatever security add-ons they can as this creates another protective layer.

Meanwhile, InfoWorld U.S. reports that in an effort to improve security in its Android Market, Google has been using a service providing automated scanning of applications submitted to the mobile application store.

Code-named Bouncer, the service scans the market for potentially malicious software without disrupting the user experience or requiring developers to submit to an application approval process, said Hiroshi Lockheimer, vice of engineering for Android, in a blog post.

 
Google also analyzes new developer accounts to help prevent malicious developers from coming back, Lockheimer said. Bouncer has been in use for a while; Google found that between the first and second halves of last year, there was a 40 per cent decrease in the number of potentially malicious downloads from Android Market.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now