Researchers Discover First Android Bootkit, 350,000 Devices Already Infected


Android.Oldboot.1.origin infections

Security researchers from Doctor Web have discovered what they believe to be the first Android bootkit. The threat has already infected 350,000 devices from all over the world.

The Trojan, dubbed Android.Oldboot.1.origin, uses some clever techniques to ensure that it cannot be removed easily. One component is installed onto the boot partition of the file system.

The unit file is modified so that when the device is started, a script is loaded and the Android.Oldboot components are installed as a typical application. Once it’s installed on a device, the threat connects to a remote server and waits for commands.

“When the mobile phone is turned on, this script loads the code of the Trojan Linux-library imei_chk (Dr.Web Anti-virus detects it as Android.Oldboot.1), which extracts the files libgooglekernel.so (Android.Oldboot.2) and GoogleKernel.apk (Android.Oldboot.1.origin) and places them in /system/lib and /system/app, respectively,” Dr. Web experts explained.

“Thus, part of the Trojan Android.Oldboot is installed as a typical application which further functions as a system service and uses the libgooglekernel.so library to connect to a remote server and receive various commands, most notably, to download, install or remove certain applications.”

The problem is that even if it’s removed, once the device is rebooted, the Trojan is reinstalled due to the component that resides in the protected memory area.

Experts believe that the malware is being distributed with the aid of modified firmware. When users reflash their smartphones and install this firmware, they’re actually infecting them with the Trojan.

Most infections (92%) have been spotted in China, which appears to be the main target. However, infected devices have also been seen in Germany, Spain, Russia, Italy, the US, Brazil and other countries from Southeast Asia.

The best way to protect your smartphone against this piece of malware is to avoid installing firmware downloaded from untrusted sources. Experts also recommend against buying devices of unknown origin.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s