Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A malicious Android app that disguises itself as Google's new social networking platform, Google+, is capable of stealing data, and answering and recording incoming phone calls, researchers said this week.
The spyware app disguises itself as Google+ by installing itself with the name “Google ++,” Jamz Yaneza, threat research manager at Trend Micro.
The malware contained in the app shares the same code structure as previously discovered Android spyware that also can steal information and record phone calls made from infected devices.
Unlike the older variants, however, the new variant can automatically answer incoming phone calls on versions 2.2 and earlier.
“Once it is installed you won't know it is doing anything malicious,” Yaneza said.
The malware automatically answers incoming phone calls made from a predefined number of the attacker's choosing.
To conceal that it is answering a call, the malware first sets an infected device on silent mode and hides the dial pad. This allows attackers to stealthily eavesdrop on conversations occurring around the phone.
The app, which must be manually installed by a user to run, is currently being distributed on an unofficial Android market, said Yaneza, who would not name the site.
It is not available in the official Google Android Market.
In addition to spying on users, the app is also capable of stealing data from infected devices, including text messages, call logs and GPS locations.
Stolen data is sent to a remote server in China, Yaneza said. The app can also receive commands, but only when they are sent from the attacker's predefined number.
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.