Cyberwarfare

Massive Android Mobile Botnet Hijacking SMS Data

A mobile botnet called MisoSMS is wreaking havoc on the Android platform, stealing personal SMS messages and exfiltrating them to attackers in China.

<p><span><strong><span>A mobile botnet called MisoSMS is wreaking havoc on the Android platform, stealing personal SMS messages and exfiltrating them to attackers in China.</span></strong></span></p>

A mobile botnet called MisoSMS is wreaking havoc on the Android platform, stealing personal SMS messages and exfiltrating them to attackers in China.

Researchers at FireEye lifted the curtain off the threat today, describing MisoSMS as “one of the largest advanced mobile botnets to date” and warning that it is being used in more than 60 spyware campaigns.

FireEye tracked the infections to Android devices in Korea and noted that the attackers are logging into command-and-controls in from Korea and mainland China, among other locations, to periodically read the stolen SMS messages.

Related Podcast: FireEye security researcher Vinay Pidathal talks about the MisoSMS botnet and the state of security on the Android ecosystem.

Listen Now

FireEye’s research team discovered a total of 64 mobile botnet campaigns in the MisoSMS malware family and a command-and-control that comprises more than 450 unique malicious e-mail accounts.

FireEye security content researcher Vinay Pidathala said MisoSMS infects Android systems by deploying a malicious Android app called “Google Vx” that masquerades as an Android settings app used for administrative tasks. 

The app uses a bit of trickery to install and hide itself from the user.  Once it’s installed, the app secretly steals the user’s personal SMS messages and emails them to a webmail command-and-control.

Advertisement. Scroll to continue reading.

Pidathala explains the SMS exfiltration method:

This application exfiltrates the SMS messages in a unique way. Some SMS-stealing malware sends the contents of users SMS messages by forwarding the messages over SMS to phone numbers under the attacker’s control. Others send the stolen SMS messages to a CnC server over TCP connections. This malicious app, by contrast, sends the stolen SMS messages to the attacker’s email address over an SMTP connection.  

Pidathala said all of the reported malicious e-mail accounts have been deactivated as part of a mitigation strategy with law enforcement and security response officials in Korea and China.

Related Podcast:

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version