Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Sixty-plus Android games on Google’s PlayStore Detected having Trojan

Security researchers have found multi-dozen game applications inside Play Store of Google contaminated with a Trojan known as Android.Xiny.19.origin. The malicious software has been created for downloading, planting as well as executing programs as per hackers' instructions.

The researchers belonging to Russian security vendor Doctor Web state that Android.Xiny contaminated over sixty games. While not really naming those applications, the researchers state that more than 30 developers distributed the games, including BILLAPPS, Fun Color Games and Conexagon Studio. Gamers taking down any game from the Store lost personal information to the hackers that the Trojan collected and transmitted onto one remote CnC (command-and-control) server.

After transmission of the personal information, Android.Xiny's controllers, depending on what specifications are on the victimized gamer's phone, would issue command to the Trojan for exhibiting advertisements inside the browser-screen of the user alternatively, making its stay more persistent via pulling down other malevolent applications.

Among the many malicious operations the malware carries out, one is asking end-users to load various program software as well as load or erase apps devoid of taking the end-user's permission. These will depend upon if there's root access. While root privileges maybe pending, the Trojan may load software followed with downloading attack codes that are on the CnC system for acquiring root access.

Of all personal information the Trojan would collect, IMSI and IMEI identifiers are included along with language and country configurations; mobile operator details; MAC address of the phone; operating software edition, the memory card type used on the device; as well as the application from where the Trojan garnered the entire information. The details regarding the device's memory card are made accessible to the hackers. Android.Xiny also pulls down and executes random .apk files after getting the hackers' command. Ibtimes.com posted this dated January 31, 2016.

Previously during January itself, Lookout the cyber-security company detected a malware called Brain Test which infected thirteen Android apps. Google, however, quickly eliminated those infected applications.

This Google did knowing that security investigators carrying out reverse engineering, instead of doubting a graphic download would actually concentrate on examining HTTPS traffic and tracking the same.

» SPAMfighter News - 2/4/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page