Researchers have noticed one of the first examples of Android "drive-by"
malware from an ordinary website, a dangerous type of automatic attack
more commonly used to infect Windows PCs.
Discovered by security company Lookout Mobile Security on a number of webistes, the decidedly odd "NotCompatible" Trojan is distributed using a web page containing a hidden iFrame.
The rough equivalent of this layer on a Vista or Windows 7 PC would be
the User Access Control (UAC) which is usually circumvented using social
engineering or by misrepresenting the nature of the application.
NotCompatible eschews such tricks beyond simply claiming to be a security update. It's not sophisticated but it might fool some users, some of the time.
Malware's Mission Unclear
The purpose of the infection is a bit of a mystery. "This specific sample, while relatively well constructed, does not
appear to go to great lengths to hide its intended purpose: it can be
used to access private networks," said Lookout's blog. "This feature in itself could be significant for system IT
administrators: a device infected with NotCompatible could potentially
be used to gain access to normally protected information or systems,
such as those maintained by enterprise or government."
The affected sites appeared to have low volumes of traffic but the
company believed the exploit iFrame was being served on other sites it
had yet to identify, it said. The warning is stark; mobile malware creators are experimenting with
what is possible for this class of malware and have found a way to get
mobile malware on to devices without them having to visit third-party
app sites as has been the case up to now.
No comments:
Post a Comment