Schneier on Security's Journal
 
[Most Recent Entries] [Calendar View]

Monday, January 21st, 2019

    Time Event
    1:30p
    Clever Smartphone Malware Concealment Technique

    This is clever</a>:

    Malicious apps hosted in the Google Play market are trying a clever trick to avoid detection -- they monitor the motion-sensor input of an infected device before installing a powerful banking trojan to make sure it doesn't load on emulators researchers use to detect attacks.

    The thinking behind the monitoring is that sensors in real end-user devices will record motion as people use them. By contrast, emulators used by security researchers­ -- and possibly Google employees screening apps submitted to Play­ -- are less likely to use sensors. Two Google Play apps recently caught dropping the Anubis banking malware on infected devices would activate the payload only when motion was detected first. Otherwise, the trojan would remain dormant.


    << Previous Day 2019/01/21
    [Calendar]
    Next Day >>

Schneier on Security   About LJ.Rossia.org