icon bookmark-bicon bookmarkicon cameraicon checkicon chevron downicon chevron lefticon chevron righticon chevron upicon closeicon v-compressicon downloadicon editicon v-expandicon fbicon fileicon filtericon flag ruicon full chevron downicon full chevron lefticon full chevron righticon full chevron upicon gpicon insicon mailicon moveicon-musicicon mutedicon nomutedicon okicon v-pauseicon v-playicon searchicon shareicon sign inicon sign upicon stepbackicon stepforicon swipe downicon tagicon tagsicon tgicon trashicon twicon vkicon yticon wticon fm
13 Aug, 2013 20:22

Google messaging service hacked, sends malware to Android users – Kaspersky

Google messaging service hacked, sends malware to Android users – Kaspersky

Russia’s Kaspersky Lab has found a backdoor in Google Cloud Messaging service (GCM) used by hackers to steal Android users’ data and force them to send paid messages. The scheme is only stoppable by Google, as it relies on stolen IDs of GCM developers.

The Russian computer security firm on Tuesday said it had notified Google of a security breach in its service, which enabled the hackers to register Trojan and Backdoor malware in the network of the internet giant.

“Such tactics rule out the possibility to block access to master server directly on the infected phone,” the Kaspersky team warned in a statement on its website.

Thus, if an Android user is lured into installing some applications containing the malware, he is doomed to have his money or private data stolen – unless Google intervenes.

Blocking the accounts of GCM developers, who’s virtual IDs have been compromised and used for Trojan’s registration, is the only way to stop the malicious algorithm, Kasperky Lab explained.

The anti-virus developers have been warning that over the past year cybercriminals have become increasingly active in targeting tablets and smartphones – especially Android devices – with malicious software.

The software may often be disguised as an installation package of a popular mobile application, such as a game or a browser.

Kaspersky Lab expert Roman Unuchek said a typical example of such a trap for Android users – dubbed Trojan-SMS.AndroidOS.OpFake.a – has already been detected in 97 countries. The firm has come across over 1 million different installation packages containing the malware.

This picture posted on Cuelogic Blog by Sagar Tambe shows how data providers can use Google Cloud Messaging (GCM) to send notifications to Android devices where their applications are installed, as well as silently synchronize data.

Once installed, this Trojan lets the hackers steal or delete phone contacts or messages of the Android device owner, send short messages or ads linking to malware to his friends – and, ultimately, secretly send “premium” texts to certain numbers, for which the owner will have to pay a tidy sum.

Another Trojan of the kind, which particularly targets Russia and the CIS countries, has been discovered by Kaspersky Lab a staggering 4.8 million times.

The screenshot shows a warning message that may appear on some Android devices if a user tries to install a malware referred to as Trojan-SMS.AndroidOS.OpFake.a by Kaspersky Lab. In this case, the malware appears to be disguised as an update package of Opera Mobile browser.

Both programs register within the GCM service, Unuchek notes. In some cases, Google Play Store – the resource monopolizing the distribution of all Android apps – may even warn the users of a potential danger before the installation, but many choose to ignore the warning message.

According to data published on Kaspersky Lab’s website, up to 12,000 new mobile threats in a form of malware are discovered monthly by the computer security firm. 99% of all such malware is said to have targeted the Android platform last year.