Android Malware Attacks in 3D

Tuesday, October 2, 2012 @ 06:10 PM gHale

There is now a piece of Android malware out there that’s capable of recording the victim’s environment and reconstructing a 3D model based on the captured data.

Mobile security experts are constantly warning Android users to carefully analyze the permissions requested by an app before installing it. If it asks for more than it should, it may be a malicious piece of software designed to steal information or even inflate the phone bill by sending out SMSs to premium rate numbers.

Build Your Own Android Malware
Profiting off Android Attacks
Malware Continues to Rise
Malware Bypasses Defenses with Ease

But what about apps that ask for permission to use the device’s camera? Researchers from the Naval Surface Warfare Center in Crane, Indiana, and the Indiana University, said allowing a program to gain control of your Android phone’s camera could be just as dangerous.

They made a piece of visual malware called PlaceRaider that’s able to create an accurate 3D model of the user’s indoor environment by taking pictures and collecting data from other sensors.

The model created by PlaceRaider doesn’t only contain the big picture, but also the objects present in the environment, which could be anything from credit cards, financial documents, information from computer monitors and other sensitive data.

Robert Empleman, Zahid Rahman, David Crandall and Apu Kapadia created and wrote about the “visual malware” in a paper entitled “PlaceRaider: Virtual Theft in Physical Spaces with Smartphones.”

PlaceRaider – designed to work on Android phones for now – ended up tested on two subjects. The malware was able to create high-quality reconstructions of an indoor office by using “opportunistic data yields models with sufficient granularity.”

One noteworthy aspect is that during the tests, the subjects utilized the devices as they would normally do.

In order to make the data collection process as efficient as possible, PlaceRaider doesn’t record videos (although it could) because their size would make them difficult to transfer back to the command and control server.

Furthermore, not all the pictures taken by the application go back to the attacker, only the ones that could be useful. For this, the experts applied lightweight heuristics in order to identify and disregard uninformative images.

Leave a Reply

You must be logged in to post a comment.