Trojan Modifies Every Download

Wednesday, February 8, 2012 @ 11:02 AM gHale

A new premium-rate SMS Android Trojan horse is able to modify its code every time it downloads in order to bypass antivirus detection, said researchers at Symantec.

This technique, known as server-side polymorphism, has existed in the desktop malware environment for years, but mobile malware creators are now beginning to adopt it.

Security Boost for Android Market
Smartphone Exposes Passwords
Android Malware Stays Hidden
Breaking Down a Malware Operation

A special mechanism that runs on the distribution server modifies certain parts of the Trojan in order to ensure that every malicious app downloaded is unique. This is different from local polymorphism where the malware modifies its own code every time it executes.

Symantec has identified multiple variants of this Trojan, which it detects as Android.Opfake, and all of them come from Russian websites. However, the malware contains instructions to automatically send SMS messages to premium-rate numbers from a large number of European and former Soviet Union countries.

In some cases, especially when security products rely heavily on static signatures, detecting malware threats that make use of server-side polymorphism can be difficult.

“As with malware that affects traditional computing devices, the level of sophistication of the polymorphism used can affect how easy or difficult the threat is to detect,” said Vikram Thakur, the principal security response manager at Symantec. “More complicated polymorphism requires more intelligent countermeasures.”

In the case of Android.Opfake the level of polymorphism is not very high, as only some of the Trojan’s data files are seeing modifications by the distribution server.

“If antivirus vendors place their detection on the executable and non-changing sections, all files would be successfully detected,” said Tim Armstrong, malware researcher at Kaspersky Lab. However, if the Trojan’s executable code were also polymorphic, the challenge of detecting it would be more difficult, he said.

Server-side polymorphism is not very widespread on the Android platform at the moment because most users get their apps through official channels and the current structure of the Android Market does not allow for a malware distribution scheme like this one, Armstrong said.

However, he agrees polymorphic Android malware could force antivirus vendors to step up their game in the future. “I think many of the features that are currently available on traditional platforms will start to arrive on these mobile platforms out of necessity as the criminals change their attack methods,” Armstrong said.

There have been developments on the mobile threat landscape and increasing their attention toward smartphones is a logical move for malware writers, because they usually go where the money is, said Jamz Yaneza, research manager at antivirus company Trend Micro.

Users should become more aware of this fact and the capabilities of their mobile devices, which are now similar to those of mobile PCs, Yaneza said. “They should treat app downloads with the same caution as they do on desktops,” and install or make use of whatever security add-ons they can as this creates another protective layer.

Leave a Reply

You must be logged in to post a comment.