2、安卓木马PluginPhantom利用插件框架逃避检测
标题:PluginPhantom: New Android Trojan Abuses “DroidPlugin” Framework
作者信息:November 30, 2016 1:00 PM By Cong Zheng and Tongbo Luo
//BEGIN
Recently, we discovered a new Google Android Trojan named “PluginPhantom”, which steals many types of user information including: files, location data, contacts and Wi-Fi information. It also takes pictures, captures screenshots, records audios, intercepts and sends SMS messages. In addition, it can log the keyboard input by the Android accessibility service, acting as a keylogger.
谷歌的Android系统下又发现新的木马啦,它属于一个家族系列,被安全专家命名为PluginPhantom。通过合法的插件构架,可以盗取各种用户信息:文件、定位数据、联系人以及Wi-Fi无线连接信息;同时还能够拍图象、截屏、录音、截获并发送SMS短信;另外一个更加传统的方式甚至还能记录Android的键击,类似传统的KeyLogger.
//END
While the Android plugin technology is very hot in the Android app development, it also gives a chance to malware developers to redesign malware in a more flexible way. Like the PluginPhantom family, malware can easily update or add modules by updating or installing plugin apps. In terms of evasion, the plugin malware can hide all malicious behaviors in plugin apps, which can be downloaded and launched to bypass static detection. Additionally, the plugin technology might be a replacement of the repackage technique in the future. The plugin malware only needs to launch the original app as one plugin, and later launch malicious modules as other plugins. Even though the PluginPhantom is the first malware using the legitimate DroidPlugin framework, we will continue to watch and report this threat as attackers may use other plugin frameworks and launch more attacks.
Android的插件技术在APP的开发过程中是非常火的,功能也很强大,以至于黑客们会充分利用其进行活动,这项技术的采用使得跟踪移动恶意代码更加困难:因为它们更容易通过插件的升级接口进行变化自身或者添加新的特性。而且它们还能很好的把自己伪装起来,使得用户看起来一切还像往常一样。目前只是发现了这样一个被利用正规的插件平台,不排除以后会有其他的合法的插件平台构架被恶意利用。
点评:Android移动安全推荐采用AVL Pro! |