Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Cross-platform Attacks Discovered on Google Play

Multi-platform Malware Poses Threat to Android and Windows Users

Multi-platform Malware Poses Threat to Android and Windows Users

Earlier this month, SecurityWeek’s Brian Prince wrote about Kaspersky Lab’s discovery of malware that is capable of jumping from Android devices to Windows PCs, turning the computer into a live microphone. As it turns out, this isn’t the only type of cross-platform attack that worked itself into Google’s application store.

Researchers at NQ Mobile have discovered another case of Android to PC malware, one that leverages the device’s USB connection to deliver a number of payloads, including keylogging or remote access.

“In this case, the malware hijacks a legitimate Android cache-cleaning app and comes to life when syncing the device with a PC via the USB port. And the motive seems to be all about money: the malware can be used to allow cyber criminals to access the machine and the sensitive data it holds or even capture keystrokes. The worm can also copy itself to all the PC’s drives, including removable ones such as flash drives, as well as mapped network drives – and even disable your Windows anti-virus software,” the company explains.

In a brief research post on the topic, NQ explains that the malware’s data capturing functions are written to encrypt and transmit the compromised data to locations in the Ukraine, Russia, or Brazil. 

On version 4.2 of Android, Google introduced a function called Verify Apps, which disallows or warns users before potentially harmful software is loaded on the device. However, recent research (which NQ did not cite fully) is said to show that only 15% of known malware is blocked with this feature.

“If you make your living developing mobile malware, and you spent hours looking for ways to quickly and efficiently multiply your demons, it would make logical sense to design them so they are able to transmit themselves between a PC and a mobile device. It was only a matter of time,” NQ researchers wrote in a blog post. 

Advertisement. Scroll to continue reading.

When it comes to these types of attacks, the criminals are targeting the Auto Run feature on Windows. Systems that are patched with Microsoft’s AutoRun fix from 2011 (XP and Vista) are immune to this attack. On Windows 7 and 8, Auto Run is disabled by default – so the attack will fail there as well, as long as users have not altered the settings.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.