voyager624 - Fotolia

Q
Manage Learn to apply best practices and optimize your operations.

Android Trojan: How is data being stolen from messaging apps?

Trustlook Labs discovered an Android Trojan stealing data from messaging apps. Learn what mobile security pros should look for to detect this malware with expert Nick Lewis.

New Android Trojan horse malware discovered by Trustlook Labs uses code obfuscation to steal data from Facebook Messenger, Skype and other instant messaging apps. How does this Trojan obfuscate its code to evade detection? What should antimalware or mobile security pros be looking for to detect this malware?

One of the key aspects of most modern malware is the use of some sort of obfuscation technique to evade detection by antimalware or endpoint security tools. When antivirus tools relied on static blacklists, it was easier to just change something in the source code, recompile the malware and start using it, as it would probably bypass the blacklist.

Modern malware uses many different obfuscation techniques, like encryption of the binaries, using legitimate software already installed on the endpoint and downloading functionality from supporting binaries as needed to evade detection. Malware may only decrypt or download the part of the code that is needed for the specific stage of the attack to increase the difficulty of analyzing each stage. This goes along with the anti-debugging functionality where malware will abort or function differently if it detects it's in a sandbox, virtual machine or being debugged to make it more difficult to identify changes it has made on an endpoint or how it establishes persistence.

Command-and-control (C&C) servers use their own evasion techniques, such as using custom protocols, using nonstandard ports and putting the C&C payload in unexpected places, like in a domain name system packet, to minimize the chance of being detected. All of these steps increase the difficulty and amount of resources needed to identify malware and determine how to effectively block it.

Trustlook Labs recently blogged about a new piece of Android Trojan horse mobile malware that was discovered using hidden, malicious code to copy and steal user information from messaging apps. Researchers didn't mention how the Android Trojan was initially identified, making it difficult to know how the malware was targeted.

However, this Android Trojan horse malware is known to target several messaging apps, such as Twitter, Viber, Skype and Facebook Messenger, to send the contents of messages to its C&C server. The Android malware then obfuscates its code to evade detection by encrypting the configuration file, modules used and even individual functions. It then checks to see if it's on an emulator or debugger and, if it determines that it is being analyzed, it will exit to prevent analysis.

Trustlook Labs mentions several indicators of compromise, such as the hash of the malware or the IP used by the C&C, which can be used to detect this specific version of the malware.

Ask the expert:
Have a question about enterprise threats? Send it via email today. (All questions are anonymous.)

This was last published in September 2018

Dig Deeper on Wireless network security

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

How do your enterprise's mobile security programs prevent the use of mobile malware?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close