{"id":83551,"date":"2016-10-26T17:41:11","date_gmt":"2016-10-26T12:11:11","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=83551"},"modified":"2016-10-26T20:03:13","modified_gmt":"2016-10-26T14:33:13","slug":"security-alert-android-backdoor-device","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/security-alert-android-backdoor-device\/","title":{"rendered":"Security Alert! Android Backdoor is after your device"},"content":{"rendered":"<p>Quick Heal Labs has detected a new threat that is out on the hunt for Android users. We came across an open-source script that adds a backdoor (<em>a secret method hackers use to gain unauthorized access to a device<\/em>) to any APK (Android application package).<\/p>\n<p>The home page of the backdoor-apk looks like this (fig 1).<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-83555 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/10\/Android-backdoor-1-1024x404.png\" alt=\"android-backdoor-1\" width=\"1024\" height=\"404\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/10\/Android-backdoor-1-1024x404.png 1024w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/10\/Android-backdoor-1-300x118.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/10\/Android-backdoor-1-768x303.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/10\/Android-backdoor-1-789x311.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/10\/Android-backdoor-1.png 1495w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: center\">Fig 1<\/p>\n<p>Although the author has mentioned that this script is intended for educational purposes only, cybercriminals are using it to fuel their evil plans. And our analysis confirms so.<\/p>\n<p>To read the technical analysis on this malware, download the PDF given below.<\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/10\/Android-Backdoor_PDF.pdf\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-82869\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/PDF-icon.png\" alt=\"PDF icon\" width=\"58\" height=\"59\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon.png 256w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-150x150.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-70x70.png 70w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-80x81.png 80w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-45x45.png 45w\" sizes=\"(max-width: 58px) 100vw, 58px\" \/><\/a><\/p>\n<p><strong>Important:<br \/>\n<\/strong>No other antivirus software has been able to detect this backdoor. Below is the result from virustotal:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-83563 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/10\/VT-1024x288.png\" alt=\"vt\" width=\"1024\" height=\"288\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/10\/VT-1024x288.png 1024w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/10\/VT-300x84.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/10\/VT-768x216.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/10\/VT-789x222.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/10\/VT.png 1198w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><strong>What does the backdoor do?<\/strong><\/p>\n<p>The package with 5 classes is just a wrapper which downloads the payload from <a href=\"https:\/\/en.wikipedia.org\/wiki\/Metasploit_Project\">Metasploit framework<\/a>. Metasploit is a framework designed for penetration testing but in this case, is being used for a malicious intent. When the payload is received by the backdoor, it gives complete access to the victim&#8217;s device to the attacker including:<\/p>\n<ul>\n<li>Starting any app<\/li>\n<li>Shutting down device<\/li>\n<li>Retrieving call logs, contacts, SMS, location, etc.<\/li>\n<li>Sending SMSs<\/li>\n<li>Recording audio from microphone<\/li>\n<li>Taking pictures from device&#8217;s camera<\/li>\n<li>Getting live video stream from device&#8217;s camera<\/li>\n<li>Accessing all the files stored on the device<\/li>\n<li>Changing wallpaper<\/li>\n<li>Accessing shell<\/li>\n<\/ul>\n<p>This is not the only script attackers are using in their malicious intents. There are much more; some are open-source while some, closed source. As scripts like these are easily available, the number of threats are increasing and are expected to keeping doing so in the future. Android users are advised to install <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security-for-android\" target=\"_blank\">Quick Heal Mobile Security App<\/a> that proactively detects and blocks this threat as \u2018Android.MetaBack.A\u2019.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-83554 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/10\/Android-backdoor-2.png\" alt=\"android-backdoor-2\" width=\"274\" height=\"488\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/10\/Android-backdoor-2.png 480w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/10\/Android-backdoor-2-169x300.png 169w\" sizes=\"(max-width: 274px) 100vw, 274px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>ACKNOWLEDGMENT<\/strong><\/p>\n<p>Subject Matter Expert<br \/>\n&#8211; Gaurav Shinde (Threat Research and Response Team)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quick Heal Labs has detected a new threat that is out on the hunt for Android users. We came across an open-source script that adds a backdoor (a secret method hackers use to gain unauthorized access to a device) to any APK (Android application package). The home page of the backdoor-apk looks like this (fig [&hellip;]<\/p>\n","protected":false},"author":29,"featured_media":83557,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55,24],"tags":[1365],"class_list":["post-83551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-android","category-malware","tag-android-backdoor"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83551"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=83551"}],"version-history":[{"count":7,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83551\/revisions"}],"predecessor-version":[{"id":83564,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83551\/revisions\/83564"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/83557"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=83551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=83551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=83551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}