Android malware places secret calls to premium rate numbers
Posted on 11.12.2013
A mobile malware family dubbed MouaBad by Lookout researchers has lately been plaguing Chinese users with older versions (3.1 and earlier) of Android.

Variants of the malware have been popping up on third party online markets for months and, until now, they were only capable of sending text messages to premium rate numbers on behalf of the user.

But the latest variant - MouaBad.p - also makes the device place calls to premium rate numbers, again with the user being none the wiser.

"In addition to never-before-seen functionality, Mouabad.p is particularly sneaky and effective in its aim to avoid detection," the researchers pointed out. "For example, it waits to make its calls until a period of time after the screen turns off and the lock screen activates. It also end the calls it makes as soon as a user interacts with their device (e.g. unlocks it)."

"In theory, this dialing functionality could also be used for other malicious purposes such as remotely spying on conversations within the vicinity of a device microphone, or simply running up a victimís wireless bill," they also noted."

But the good news is that MouaBad.p is incapable of modifying call logs, so a look at the call history will immediately indicate that something shady has been going on and, ideally, alert users to the presence of malware on their device.

Another good news is that, for now, the C&C server directing the actions of the malware is currently down.


Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Thu, Feb 4th