Skip to main content
  1. Tech
  2. Gadgets & Tech
  3. Tech Gear

New Android malware may be coming to your device

See also

WOCHit shared this new video with The Examiner on Thursday, Feb. 27 2014. It is about the new, insidious and important malware hiding in the Tor private network. Securelist made excellent documentation on this entirely new malware (by Roman Unuchek) Feb. 25, 2014. As you see in the video Tom's Guide also gives excellent information on this new species of malware (by Jill Scharr) Feb. 26, 2014. As of now, the new virus has the rather technical name of Backdoor.AndroidOS.Torec.a. Many other online authorities have posted on this new development in the hackerverse. This new infection may be coming to your smartphone or device.

PC World reports the new Android malware may also be nicknamed 'Slempo' - as per Adam Kujawa (Malwarebytes leader Malware Intelligence Team). Slempo may be operating in the 'Stoned Cat' botnet. Hackers may have turned the Tor Orbot client into the new malware by altering it. It may be of interest that Orbot couldn't be accessed on this server using Chrome but could be accessed on Internet Explorer. Using a Tor client is somewhat sneaky in that it is challenging (if possible) to trace the virus back to the source. The Tor network reportedly "bounces around" the signal to and from many proxy servers to cover up the "hacker tracks". But has your device caught the new bug?

Has the new Android malware actually made any attacks on devices? Kaspersky Labs and Securelist really don't say. Once attacks are detected it seems likely that the mainstream media should pick up on the new bug. Securelist does explain in technical terms how the new malware may function. If one can check the android.support file one might (in theory) be able to detect new entries. This is how Securelist has basically detected new hacker/virus codes in the past - except for this new thing.

Roman's post (Securelist) displays all (or some) of the new Android malware hacker command codes. These are communicated through the C&C to the device. The commands are quite literal and even the layperson should be able to read them - if they can find them. The new inserted codes can intercept your device's SMS messages and even stop them. It can make USSD requests and retrieve/reroute your telephone data. You might check your message and phone logs on your device. The new malware might be a great tool for the NSA!

Advertisement

Related Videos:

  • Mayim Bialik TI Selfie
    <iframe width="560" height="315" src="//www.youtube.com/embed/WeFb8VziQsk?VQ=HD720&amp;allowfullscreen=true&amp;autoplay=1"></iframe>
  • 3 reasons for choosing the right web hosting provider
    <div class="video-info" data-id="517023666" data-param-name="playList" data-provider="5min" data-url="http://pshared.5min.com/Scripts/PlayerSeed.js?sid=1304&width=480&height=401&playList=517023666&autoStart=true"></div>
  • April BUILD 2014 dev conference
    <div class="video-info" data-id="518082545" data-param-name="playList" data-provider="5min" data-url="http://pshared.5min.com/Scripts/PlayerSeed.js?sid=1304&width=480&height=401&playList=518082545&autoStart=true"></div>