Skip to main content
  1. Tech
  2. Gadgets & Tech
  3. Tech Gear

New Android malware may be coming to your device

See also

WOCHit shared this new video with The Examiner on Thursday, Feb. 27 2014. It is about the new, insidious and important malware hiding in the Tor private network. Securelist made excellent documentation on this entirely new malware (by Roman Unuchek) Feb. 25, 2014. As you see in the video Tom's Guide also gives excellent information on this new species of malware (by Jill Scharr) Feb. 26, 2014. As of now, the new virus has the rather technical name of Backdoor.AndroidOS.Torec.a. Many other online authorities have posted on this new development in the hackerverse. This new infection may be coming to your smartphone or device.

PC World reports the new Android malware may also be nicknamed 'Slempo' - as per Adam Kujawa (Malwarebytes leader Malware Intelligence Team). Slempo may be operating in the 'Stoned Cat' botnet. Hackers may have turned the Tor Orbot client into the new malware by altering it. It may be of interest that Orbot couldn't be accessed on this server using Chrome but could be accessed on Internet Explorer. Using a Tor client is somewhat sneaky in that it is challenging (if possible) to trace the virus back to the source. The Tor network reportedly "bounces around" the signal to and from many proxy servers to cover up the "hacker tracks". But has your device caught the new bug?

Has the new Android malware actually made any attacks on devices? Kaspersky Labs and Securelist really don't say. Once attacks are detected it seems likely that the mainstream media should pick up on the new bug. Securelist does explain in technical terms how the new malware may function. If one can check the file one might (in theory) be able to detect new entries. This is how Securelist has basically detected new hacker/virus codes in the past - except for this new thing.

Roman's post (Securelist) displays all (or some) of the new Android malware hacker command codes. These are communicated through the C&C to the device. The commands are quite literal and even the layperson should be able to read them - if they can find them. The new inserted codes can intercept your device's SMS messages and even stop them. It can make USSD requests and retrieve/reroute your telephone data. You might check your message and phone logs on your device. The new malware might be a great tool for the NSA!


Don't Miss

  • Crew
    'The Crew' preview: Ubisoft has on its hands the 'Destiny' of racing games
    Games Preview
  • Cell phone
    A bill legalizing unlocking phones has passed Congress and is expected to be signed into law
    Tech Buzz
  • Destiny
    The 'Destiny' beta: 7 things we absolutely love about Bungie's new franchise
    Games Feature
  • Cortana
    Cortana takes on Siri in a hilarious new commercial for the Windows Phone
    Tech Buzz
  • Unity Exclusive
    'Assassin's Creed Unity' exclusive: Tell the world, 'I'm coming home'
    Games Interview
  • Typing
    Is your brokerage account safe from the attacks of cyber thieves?

Related Videos:

  • Twitter
    <div class="video-info" data-id="517839330" data-param-name="playList" data-provider="5min" data-url=""></div>
  • Google research
    <div class="video-info" data-id="518340583" data-param-name="playList" data-provider="5min" data-url=""></div>
  • Attendees gather at the Apple Worldwide Developers Conference at the Moscone West center on June 2, 2014 in San Francisco, California. Apple CEO Tim Cook kicked off the annual WWDC which is typically a showcase for upcoming updates to Apple hardware and s
    <div class="video-info" data-id="518310091" data-param-name="playList" data-provider="5min" data-url=""></div>