Spyware/Botnet Another observed type of Android malware is classified as
spyware and has capabilities to forward private data to a remote server. In a
more complex form, the malware could also receive commands from the server
to start specific activities in which case it is part of a botnet. Spyware is likely
to use some of the components described in Section 2.3.1. Broadcast receivers
are of particular interest as they can be used to secretly intercept and forward
incoming SMS messages to a remote server or to wait for BOOT COMPLETED to
start a background service as soon as the device is started.
In the summer of 2012, the sophisticated Eurograbber attack showed that
these type of malware may be very lucrative by stealing an estimated €36,000,000
from bank customers in Italy, Germany, Spain and the Netherlands [39].
2.4.2 Malware distribution
A problem with third-party marketplaces described in Section 2.3.4, is the lack
of accountability. There are often no entry limitations for mobile app developers
which results in poor and unreliable applications being pushed to these stores
and making it to Android devices. Juniper Networks finds that malicious appli-
cations often originate from these marketplaces, with China (173 stores hosting
some malware) and Russia (132 ‘infected’ stores) being the world’s leading sup-
pliers [38].
One of the issues Android has to deal with in respect to malware distribution
is the loose management of the devices. Over the past few years, Android
versions have become fragmented, with only 6.5% of all devices running the
latest Android version 4.2 (codename Jelly Bean). More than two years after
its first release in February 2011, a majority of Android devices (33.0%) is still
running Android 2.3.3–2.3.7 (codename Gingerbread)
14
. This fragmentation
makes new security features only available to a small group of users who happen
to use the latest Android release. Any technique invented to prevent malicious
behavior will never reach the majority of Android users, until they buy a new
device.
One of the security enhancements in Android 4.2, for example, is the more
control of premium SMS feature
15
. This feature notifies the user when an
application tries to send an SMS message that might cause additional charges.
This feature would prevent a large portion of the previously discussed SMS
trojans, but is unfortunately not attainable for the majority of Android users.
New Android releases also come with bugfixes for core components to pre-
vent against arbitrary code execution exploits. Android versions prior to 2.3.7
are especially vulnerable to these root exploits (examples include rage against
the cage
16
, exploid
17
and zergRush
18
). While these exploits were originally de-
veloped to overcome limitations that carriers and hardware manufactures put on
some devices, they have also been used by malware to obtain a higher privilege
level without a user’s consent. This approach allows malware to request only a
few permissions during app installation, but still access the entire system once
the app is started.
14
http://developer.android.com/about/dashboards/index.html
15
http://source.android.com/devices/tech/security/enhancements.html
16
http://dtors.org/2010/08/25/reversing-latest-exploid-release
17
http://thesnkchrmr.wordpress.com/2011/03/27/udev-exploit-exploid
18
http://github.com/revolutionary/zergRush
17