New Android trojan can thwart two-factor authentication

Status
Not open for further replies.

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
Info Security said:
Mobile malware is cresting as it never has in the past, with new bugs being developed at breakneck speed. One of these, a new version of the Pincer trojan for Android that can intercept inbound text messages and forward them on, can compromise two-factor authentication protections.

Russian anti-virus company Doctor Web is warning users about Android.Pincer.2.origin, a serious threat that can steal SMS messages containing sensitive information such as mTAN codes, which are used to confirm online banking transactions. Essentially, it offers hackers a way around two-step authentication protection to thwart phishing scams and the like.

Unfortunately, Pincer 2 allows criminals to use the trojan for targeted attacks and to steal specific messages, not just cast a wide net. For example, it can specifically wait for SMS communications from two-factor systems that use text messages to verify a user’s identity, or services that send a text message with a randomized password when users want to log into an account. Twitter, for instance, just implemented such a scheme.

Like its predecessor, this malicious program is spread as a fake security certificate that tells users it “must” be installed onto his or her Android device. If a careless user does install the program and attempts to launch it, the crafty side of the bug kicks in: Android.Pincer.2.origin will display a fake notification about the certificate’s successful installation and will not perform any noticeable activities for a while in order to avoid detection.

Doctor Web found that to be loaded at startup, the trojan will make sure that its process – CheckCommandServices – will be run as a background service. If at some point Android.Pincer.2.origin is launched successfully at startup, it will connect to a remote Command & Control server and send information about the mobile device, including handset model, serial number, carrier, operating system, phone number and the availability of the root account.

After that, the program waits for the attackers to indicate the number from which the trojan needs to intercept messages. Attackers can also ask it to do a range of other things, including sending text messages using specified parameters or to certain numbers, sending USSD messages and displaying a message on the screen of the mobile device.

Read more: http://www.infosecurity-magazine.com/view/32610/new-android-trojan-can-thwart-twofactor-authentication/
 

Ink

Administrator
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
I was waiting for this to happen, and it was only a matter of time before it did. :666:
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top