Just In
- 5 hrs ago Elon Musk’s X Is Launching a TV App Similar to YouTube for Watching Videos
- 6 hrs ago Qualcomm Reveals Snapdragon X Plus Chip for Laptops: 10 Core CPU, On-Device AI, & Much More
- 6 hrs ago Flipkart Teases “Jaw-Dropping” Discount on iPhone 15: All-Time Low Price Anticipated
- 6 hrs ago President Joe Biden Signs Bill to Ban TikTok in the US: Unless This One Condition is Met
Don't Miss
- Finance 1:10 Split, Rs 51 Dividend: Accumulate Tata Stock, TP Rs 170; Big Update On £1.25 Bn Investment
- News Harvey Weinstein's Conviction Overturned, Netizens Angered Over Elite Privilege
- Movies Arti Singh Wedding: Groom Dipak Chauhan’s First Look Out As He Reaches Venue With Baraat - VIRAL VIDEOS
- Sports T20 World Cup 2024: Waqar Younis Predicts Pakistan's 15-Man Squad; Drops This Express Pacer
- Automobiles Royal Enfield Unveils Revolutionary Rentals & Tours Service: Check Out All Details Here
- Education AICTE introduces career portal for 3 million students, offering fully-sponsored trip to Silicon Valley
- Lifestyle Heeramandi Screening: Alia Bhatt, Ananya Panday, Rashmika Mandanna And Others Serve Finest Ethnic Style!
- Travel Escape to Kalimpong, Gangtok, and Darjeeling with IRCTC's Tour Package; Check Itinerary
Kaspersky Discovers The Most Sophisticated Android Trojan
IT security firm Kaspersky has reported that it has recently discovered an Android Trojan, which they are calling as the most sophisticated malware yet. Upon analysis of an android application, Kaspersky discovered a file (DEX), which turned out to be a multi-functional Trojan. Dubbed as Backdoor.AndroidOS.Obad.a or "Obad", the malicious program can send SMS to premium-rate numbers, download other malware programs, install them on the infected device and also transfer them via Bluetooth. It is also said to be capable of performing remote commands in the console.
The trojan apparently takes advantage of an error in the DEX2JAR software - a program typically used by analysts to convert APK files into the more convenient Java Archive (JAR) format. Obad utilizes multiple strings of encryption and highly complicated coding to remain concealed.
Also, the malware exploits an error in the AndroidManifest.xml file, which is present in every Android application, to gain access to a device. Once inside, it is said to raise havoc, as it gains access to Device Administrator privileges. What's worse is Obad does not have an interface and works in background mode. Meaning, once inside, it will remains invisible, making it impossible for the users to delete it.
Kaspersky has already informed Google about the Device Administrator vulnerability in Android. The IT security firm writes in it's blog that despite having such impressive capabilities, the malware isn't wide spread. "Over a 3-day observation period using Kaspersky Security Network data, Obad.a installation attempts made up no more than 0.15% of all attempts to infect mobile devices with various malware" read the blog.
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
11,999
-
16,026
-
14,248
-
14,466
-
26,634
-
18,800
-
62,425
-
1,15,909
-
93,635
-
75,804