1. All Stories
  2. Politics
  3. Economy
  4. World
  5. Nuclear
  6. Society/Culture
  7. Space/Science
  8. Sports
  9. Tourism
  10. Other Media
  11. Videos
  12. Photos
  13. Cartoons
  14. Interview
    • فارسی
    • عربی
    • Türkçe
    • עברית
    • Pусский
  • RSS
  • Telegram
  • Instagram
  • Twitter
  • Facebook
  • All Stories
  • Politics
  • Economy
  • World
  • Nuclear
  • Society/Culture
  • Space/Science
  • Sports
  • Tourism
  • Other Media
  • Videos
  • Photos
  • Cartoons
  • Interview

Under Development Spyware Project Plunders Private Conversations in Android

  • September, 26, 2018 - 17:50
  • Space/Science news
Under Development Spyware Project Plunders Private Conversations in Android

TEHRAN (Tasnim) - An online open project was discovered under development that is able to rifle through private conversation apps such as WhatsApp.

Space/Science

The malware, originally discovered by ESET researcher Lukas Stefanko, is not only able to compromise WhatsApp messages but also contains a variety of standard surveillance features.

An investigation into the new spyware conducted by G DATA SecurityLabs uncovered the malware's code in a public repository titled "OwnMe" on GitHub.

The malware consists of a MainActivity.class which launches the OwnMe.class service. A pop-up message is then shown to the Android user with the text, "Service started," which implies the malware is still in development, ZDnet reported.

With the exception of malicious code such as ransomware, the majority of malware families will attempt to hide their presence in infected devices through covert operations and obfuscation techniques.

In the cases of spyware and stalkerware, especially, you do not want a victim to know they are being watched -- and so such a message would not likely be included in the final build.

The service also defines a number of variables which contain empty fields -- at least, for now.

After being called, the service begins with the startExploit() function. If the spyware has Internet access, a connection to a server is established.

The malware has a number of interesting features. However, some of which appear to be unfinished, such as a screenshot function element uncovered in the software's code.

"However, no actual screenshot function is called and nothing is sent to the server in here," G DATA says. "This furthermore strengthens our thesis that this function is yet still under development."

Another function has been created to compromise WhatsApp data. This function uploads the user's WhatsApp database to a command-and-control (C2) center using a .php query, as well as the username and the android_id variables taken from the startup process.

The malware is also to use a function named getHistory() to grab titles, times, URLs and visits from user bookmarks. However, this function only fetches saved bookmarks and, at least at present, is not able to rifle through the full browsing histories of victims.

Contacts are also a target, which is typical of spyware variants. Names and phone numbers, as well as call logs, if the malicious app has been granted permission to read Android call histories.

Gallery access and camera functions are also compromised, and the malware also contains a function which checks battery levels and CPU usage.

"However, there is no implementation for a message check like with the commands above and hence that command is not actively used yet," the researchers note.

In order to maintain persistence, the malicious app will restart itself on reboot.

The malware is still in development and may not be released into the wild. However, the creation of new Android malware is no surprise with mobile malware development and deployment on the rise.

App47 estimates that mobile malware variants have risen by 54 percent since 2016, an increase from 17,000 to 27,000 currently known variants.

In August, Bitdefender researchers uncovered a different form of Android spyware. Dubbed Triout, the malware has the ability to record phone calls, monitor text messages, steal media content and track user locations.

 
R1517/P42329
Read more
Rare Alzheimer's Disease Patients May Delay Cognitive Decline with Exercise
Photosynthetic Machinery Could Help Develop Next-Gen Solar Biotechnologies
Scientists Develop New Technologies to Interact with Bees (+Video)
AI Learns to Associate Images with Spoken Words Like Babies
New Twitter Bug Delivers User-Interactions & DMs to Third Party
tasnim
tasnim
tasnim
  • About
  • Contact Us
  • Most Visited
  • Archive
Follow Us:
  • RSS
  • Telegram
  • Instagram
  • Twitter
  • Facebook

All Content by Tasnim News Agency is licensed under a Creative Commons Attribution 4.0 International License.