Premium-rate SMS trojan shares code with SpyEye variant

Share this article:
Researchers have discovered a group of premium-rate SMS trojans that share code with Spitmo, a mobile variant of the notorious banking trojan SpyEye, according to F-Secure.

The so-called “cousins of Spitmo" are premium-rate SMS trojans that target Russian users of Symbian and Windows Mobile phones, Sean Sullivan, security adviser at F-Secure, told SCMagazineUS.com on Thursday. The malware was named OpFake because the installer purports to be an updater for Opera Mini, a mobile web browser.

Once installed on a victim's phone, OpFake sends SMS messages to Russian-based premium-rate numbers without the owner's consent, Sullivan said. The malware then prevents messages that verify the text went through from being sent back to the user's phone.

The source code used to intercept incoming messages is nearly identical to that in Spitmo.

Earlier this week, F-Secure analysts discovered 54 OpFake samples while testing a new automation system they developed to scan and analyze Symbian malware, Sullivan said. When looking deeper into the OpFake Symbian binaries, researchers uncovered a St. Petersburg, Russia-based IP address for a server that was also storing Windows Mobile versions of OpFake.

That means the malware writers may also be targeting other mobile operating systems, Sullivan said.

“We would be pretty surprised if they didn't have some version for Android in the works, if they don't have it already,” he said.  

Researchers have reported the malicious server's IP address to CERT-FI, the Finnish national computer security incident response team.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

Reported breaches involving zero-day bug at JPMorgan Chase, other banks

Reported breaches involving zero-day bug at JPMorgan Chase, ...

Hackers exploited a zero-day vulnerability and gained access to sensitive information from JPMorgan Chase and at least four other financial institutions, reports indicate.

Data on 97K Bugzilla users posted online for about three months

During a migration of the testing server for test builds of Bugzilla software, data on about 97,000 Bugzilla users was inadvertently posted publicly online.

Chinese national had access to data on 5M Arizona drivers, possible breach ...

Although Lizhong Fan left the U.S. in 2007, the agencies responsible for giving him access to Americans' personal information have yet to disclose the details of the case to the public.