A new instance of smartphone malware run under the command and control of a blog has been discovered via a third-party Chinese Android app store by antivirus firm Trend Micro.
The ANDROIDOS_ANSERVERBOT.A is disguised as an e-book reader but gives its game away at installation by asking for a huge number of permissions including the ability to access network settings and the Internet, make calls and disable key locks.
The malware works via two command and control servers, one of which belongs to a blog with encrypted posts which identify the URL of the primary C&C server. New copies of the The ANDROIDOS_ANSERVERBOT.A are also ‘available’ through blog and are automatically downloaded once a hacked handset connects to the server.
Further ‘features’ contained within the app include the capacity to read low-level logfiles, read and write contact details, restart apps, use SMS and control a device’s vibration alert.
For Life Of Android’s six tips on how to beat the smartphone hackers click here.