New Android spyware answers incoming calls

Share this article:
A malicious Android app that disguises itself as Google's new social networking platform, Google+, is capable of stealing data, and answering and recording incoming phone calls, researchers said this week.

The spyware app disguises itself as Google+ by installing itself with the name “Google ++,” Jamz Yaneza, threat research manager at Trend Micro, told SCMagazineUS.com on Monday.

The malware contained in the app shares the same code structure as previously discovered Android spyware that also can steal information and record phone calls made from infected devices. Unlike the older variants, however, the new variant can automatically answer incoming phone calls on versions 2.2 and earlier.

“Once it is installed you won't know it is doing anything malicious,” Yaneza said.

The malware automatically answers incoming phone calls made from a predefined number of the attacker's choosing. To conceal that it is answering a call, the malware first sets an infected device on silent mode and hides the dial pad. This allows attackers to stealthily eavesdrop on conversations occurring around the phone.

The app, which must be manually installed by a user to run, is currently being distributed on an unofficial Android  market, said Yaneza, who would not name the site. It is not available in the official Google Android Market.

In addition to spying on users, the app is also capable of stealing data from infected devices, including text messages, call logs and GPS locations.

Stolen data is sent to a remote server in China, Yaneza said. The app can also receive commands, but only when they are sent from the attacker's predefined number. 

A Google spokesperson did not immediately respond when contacted by SCMagazineUS.com on Monday.

Share this article:

Sign up to our newsletters

More in News

Latest Citadel trick allows RDP access after malware's removal

Latest Citadel trick allows RDP access after malware's ...

Trusteer, an IBM company, said the new Citadel configuration was detected this month.

Cryptoblocker variant emerges, encryption differs from CryptoLocker

Trend Micro has detected a variant of CryptoLocker in the wild that relies on the advanced encryption standard.

Jimmy John's sandwich chain investigating possible breach

Some financial institutions have indicated that credit cards recently used at Jimmy John's locations have been used to make fraudulent purchases.