Explorer

New Dvmap Trojan can delete system's root access, reveals Kaspersky

New Delhi [India], June 10 (ANI): The recently discovered Dvmap Trojan can destroy root access after gaining rights on an Android smartphone, revealed Kaspersky Lab experts. Subsequently, since it cannot be detected, there also looms a threat of the device being controlled by the Trojan, by injecting a malicious code into the system library.

The introduction of the code injection capability is a dangerous new development in mobile malware. Since the approach can be used to execute malicious modules even with root access deleted, any security solutions and banking apps with root-detection features that are installed after infection won't spot the presence of the malware.

However, modification of the system libraries is a risky process that can misfire. The researchers observed that the Dvmap malware tracks and reports its every move to its command and control server - although the command server didn't respond with instructions. This suggests that the malware is not yet fully ready or implemented.

Dvmap is distributed as a game through Google Play Store. To bypass the store's security checks, the malware creators uploaded a clean app to the store at the end of March 2017.They then updated this with a malicious version for a short period of time, before uploading another clean version. In the space of four weeks they did this at least five times.

The Dvmap Trojan installs itself onto a victim device in two stages. During the initial phase, the malware tries to gain root rights on the device. If successful, it will install a number of tools, some of which carry comments in the Chinese language. One of these modules is an application, 'com.qualcmm.timeservice', which connects the Trojan to its command and control server. However, during the period of investigation the malware did not receive any commands in return.

In the main phase of infection, the Trojan launches a 'start' file, checks the version of Android installed and decides which library to inject its code into. The next step: overwriting the existing code with malicious code, can cause the infected device to crash.

The newly-patched system libraries execute a malicious module which can turn off the 'VerifyApps' feature. It then switches on the setting 'Unknown sources' which allows it to install apps from anywhere, not just the Google Play Store. These could be malicious or unsolicited advertising apps.

"The Dvmap Trojan marks a dangerous new development in Android malware, with the malicious code injecting itself into system libraries where it is harder to detect and remove. Users who don't have the security in place to identify and block the threat before it breaks in have a difficult time ahead. We believe that we have uncovered the malware at a very early stage. Our analysis shows that the malicious modules report their every move to the attackers and some techniques can break the infected devices. Time is of the essence if we are going to prevent a massive and dangerous attack," said Roman Unuchek, Senior Malware Analyst, Kaspersky Lab.

The Trojan, which was downloaded from Google Play more than 50,000 times since inception, has now been removed from the store.

However, Kaspersky experts believe that users must organise and back-up data from time to time. Additionally, Kaspersky also recommended users to install a reliable security solution, check that apps have been created by a reputable developer, to keep their OS and application software up-to-date, and not to download anything that looks at all suspicious or whose source cannot be verified. (ANI)

View More
Advertisement
Advertisement
25°C
New Delhi
Rain: 100mm
Humidity: 97%
Wind: WNW 47km/h
See Today's Weather
powered by
Accu Weather
Advertisement

Top Headlines

J&K: Encounter Underway In Kulgam, 4 Terrorists, 2 Soldiers Killed So Far
J&K: Encounter Underway In Kulgam, 4 Terrorists, 2 Soldiers Killed So Far
Amit Shah Performs 'Mangla Aarti' At Gujarat's Jagannath Temple Ahead Of 'Rath Yatra'
Amit Shah Performs 'Mangla Aarti' At Gujarat's Jagannath Temple Ahead Of 'Rath Yatra'
Odisha: Chariots Brought To Puri Srimandir, Security Tightened As Prez Murmu To Witness Jagannath Rath Yatra Today
Odisha: Chariots Brought To Puri Srimandir, Prez Murmu To Witness Jagannath Rath Yatra Today
Monsoon 2024: Shah Dials Himanta As Assam Flood Situation Remains Grim, Bihar Rivers In Spate — Top Points
Monsoon 2024: Shah Dials Himanta As Assam Flood Situation Remains Grim, Bihar Rivers In Spate — Top Points
Advertisement
ABP Premium

Videos

What Could Be The Possible Reason Of Chest Pain Other Than Heart Attack? | Health LiveMenstrual Health: What Is The Reason Of Vaginal Bleeding Without Periods? | Health LiveHealth Tip: How Can Ayurveda Transform Your Life? Know It All From Prof. Rabinarayan AcharyaBreaking News: Rahul Gandhi's Gujarat Visit Today, Will Meet Families Of Rajkot Fire Victims
Embed widget