Malicious Android app taps user contacts

Another malicious Android app is spotted - this time texting all user contacts and taking phone data.

Mobile threat

A malicious Android app, impersonating a legitimate application, has been spotted texting all contacts from users' phonebooks.

Once downloaded, the purported copy of Incorporateapps' Walk and Text app, which contains none of the functionality of the original, took phone data and sent texts, which were charged to the sender.

Data targeted by the malicious app, which Android owners could have downloaded from a variety of forums and file sharing sites, included phone numbers and IMEI codes.

The Trojanised app also recommended users installed the legitimate version of the application and even forwarded them to the official Android Market page, begging the question who was behind the fake app.

"One possibility is that it was a fan of Incorporateapps applications who attempted to protect the company from piracy," said Vanja Svajcer, principal virus researcher at SophosLabs, on a blog.

"Another possibility is that it was somebody who wanted to damage the company's reputation so that it appears that they stand behind the attack. The jury on that one is still out there."

The mobile security space could be set for an explosion in activity this year.

Despite attacks being low in quantity compared to PCs, McAfee claimed it saw a spike in mobile security threats in 2010.

The number of pieces of new mobile malware the firm found in 2010 rose 46 per cent over 2009.

As hackers often go for the lowest hanging fruit, Android owners may want to be particularly wary, given research this week indicated the platform was now more popular than Apple's iOS.

Featured Resources

Shining light on new 'cool' cloud technologies and their drawbacks

IONOS Cloud Up! Summit, Cloud Technology Session with Russell Barley

Watch now

Build mobile and web apps faster

Three proven tips to accelerate modern app development

Free download

Reduce the carbon footprint of IT operations up to 88%

A carbon reduction opportunity

Free Download

Comparing serverless and server-based technologies

Determining the total cost of ownership

Free download

Recommended

Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

24 Nov 2021
What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

12 Nov 2021