Threat of the month: AndroidOS/Smspacem

Share this article:
What is it?
Mobile malware which leverages trojan, bot and “logic bomb” tricks.  

How does it work?
Infection requires the installation of a trojaned app called “Holy ****ing Bible.” Following installation and a reboot, a rogue service is started that queries a remote location for command-and-control instructions while attempting to communicate the device's phone number to another host-based service. An SMS listener, is controlled via the logic bomb and only starts when the system time reaches May 21, 2011. A doomsday message is then spammed via SMS to all contacts. On May 22, a new message is sent out, and the wallpaper gets changed.

Should I be worried?

It illustrates that tricks employed against the PC platform will be repackaged against the Android.   

How can I prevent it?

Installing only Android Market apps is a start, but we recognize the openness of the Android platform is tempting, so a mobile security app is recommended. 
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in Features

Game theory: Cyber preparedness

Game theory: Cyber preparedness

Business leaders are beginning to fathom the importance of cyber war game simulation exercises, reports James Hale.

Forward progress: How the Denver Broncos really play defense

Forward progress: How the Denver Broncos really play ...

Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.

Smart defense: A talk with industry veteran Gene Fredriksen

Smart defense: A talk with industry veteran Gene ...

Today's CISO must stay ahead of attackers, says Gene Fredriksen, CISO at PSCU. Teri Robinson talks one on one with the industry veteran.