Thursday, June 2, 2011

Virus for Android was executed when the user answers calls


It seems that, to the chagrin of fans of Android, the wave of viruses, trojans and other ugly critters masquerading as legitimate applications on the Android Market did not have time to end. This time, were discovered at least 34 apps with malicious code that was implemented specifically when the owner received a call from Android.


According to security firm Lookout Security, this new virus is a variant of the former DroidDream malware that has infected the Android Market in March this year.

Called DroidDream Light and being a simpler version of the old malware, this worm disguised itself legitimate applications in Android Market and was available for download by any user. In some cases, the virus carried content descriptions and "flamboyant" to call the attention of the unwary.

Once installed, the malicious code was inert until you receive a call or an SMS. At this time he was activated and sent to various developers of mobile data, such as model, IMEI, IMSI and the version of the SDK, as well as information about the applications installed on the device. Most worrisome is that the application need not even be opened prior to that happening. Once installed, just waiting for the next call.

The Lookout Security also says that malware can install malicious code on the device, but this requires that the user authorizes the action. One estimate says that around 30,000 to 120,000 may have been infected with DroidDream Light.

But do not throw your smartphone with Android out the window yet! Google itself has already removed these apps from the Android Market, and also removed some malware from the remote devices, using a method somewhat questionable: remotely, the company installed the application "Android Market Security Tool March 2011," with root privileges and without asking permission. This application removes the malware and then uninstalls itself.

In other words: for now, the Android Market are free of harmful applications. It remains to know when, and how Google intends to handle these security flaws listed in the store.