Malicious Android app taps user contacts
Another malicious Android app is spotted - this time texting all user contacts and taking phone data.
A malicious Android app, impersonating a legitimate application, has been spotted texting all contacts from users' phonebooks.
Once downloaded, the purported copy of Incorporateapps' Walk and Text app, which contains none of the functionality of the original, took phone data and sent texts, which were charged to the sender.
Data targeted by the malicious app, which Android owners could have downloaded from a variety of forums and file sharing sites, included phone numbers and IMEI codes.
The Trojanised app also recommended users installed the legitimate version of the application and even forwarded them to the official Android Market page, begging the question who was behind the fake app.
"One possibility is that it was a fan of Incorporateapps applications who attempted to protect the company from piracy," said Vanja Svajcer, principal virus researcher at SophosLabs, on a blog.
"Another possibility is that it was somebody who wanted to damage the company's reputation so that it appears that they stand behind the attack. The jury on that one is still out there."
The mobile security space could be set for an explosion in activity this year.
Despite attacks being low in quantity compared to PCs, McAfee claimed it saw a spike in mobile security threats in 2010.
The number of pieces of new mobile malware the firm found in 2010 rose 46 per cent over 2009.
As hackers often go for the lowest hanging fruit, Android owners may want to be particularly wary, given research this week indicated the platform was now more popular than Apple's iOS.
Shining light on new 'cool' cloud technologies and their drawbacks
IONOS Cloud Up! Summit, Cloud Technology Session with Russell BarleyWatch now
Build mobile and web apps faster
Three proven tips to accelerate modern app developmentFree download
Reduce the carbon footprint of IT operations up to 88%
A carbon reduction opportunityFree Download
Comparing serverless and server-based technologies
Determining the total cost of ownershipFree download