The hackers behind this malware have uploaded multiple versions of the game, starting with a clean one, followed by a malicious one and so on.The Trojan was embedded in a game called colourblock which was called as the "simplest, challenging, addictive" puzzle game, the trojan was particularly malicious. However, Google took steps to remove it from the Play Store already.
It then utilises the control it has over the Android device to permit it to install apps from anywhere, not just Google Play Store, which may bring in even more infected apps. If the operation performed successfully, the malware would install tools to connect the Trojan to the Camp;C server. The discovery occurred during result checks from an internal system which Unechek monitors so as to find new strains of rooting malware.The Trojan was discovered Roman Unuchek, a senior malware analyst working with Kaspersky Lab, back in May 19.So basically, once the app had been installed, the Trojan would try
Apps feature, which is Googles Android malware scannerThe interesting part herein was once the whole business was complete, the server would never respond back to the prompts sent by the Trojan which meant the malware is not ready yet, or it is yet to be implemented. Dvmap had the capability of rooting an Android device and injecting malicious code into the infected devices system library.With all the malware and ransomware news flying around, now a new Android Trojan has been spotted on Google Play called Dvmap
درباره این سایت