Share

Related Links

  • NetQin
  • Reed Exhibitions Ltd is not responsible for the content of external websites.

Related Stories

  • Smartphones to outsell PCs - better security needed
    With sales of smartphones continuing to rise - to the point where more smartphones are now expected to be sold this year than conventional PCs - hackers are turning their attentions away from Windows-driven PCs and over to the iPhones, Androids and Win7 handsets in our pockets.
  • Android search engine manipulation trojan dissected
    A rash of Google Android malware has appeared in recent weeks, causing one security researcher to dissect how one nasty piece of code, Android.Adrd - a search engine manipulation trojan - functions, and compare it to another piece of malware, Android.Geinimi.
  • Mobile World Congress: F-Secure introduces Android and Symbian protection
    F-Secure has released version 7 of its Protection Service for Mobile (PSM 7) which extends the smartphone security software-as-a-service (SaaS) platform to support Google Android and Symbian handsets.
  • Android 'sensory malware' steals financial data on the fly
    Researchers at US and Hong Kong universities have developed a new type of malware for the Google Android platform that sits in the background, evaluating the voice and internet data flowing through the smartphone and, when it senses something valuable to cybercriminals, it bursts into action and relays the data to electronic crooks.
  • Sophos embraces iPhone, Android and Windows Mobile platforms
    It looks like the message from analysts that smartphones offer a backdoor to company IT systems is getting through, as Sophos has taken the wraps off Mobile Control, a security offering which is designed for iPhones, Windows Mobile and Google Android devices.

Top 5 Stories

News

Two Android viruses circulating in the wild

28 February 2011

Two Google Android viruses have been spotted circulating and infecting users’ smartphones in the wild. The viruses are potentially nasty because one - SW.SecurePhone - uploads data to remote servers from the users' handset, whilst the other - SW.Qieting - auto-forwards messages to a remote number.

NetQin Mobile, a Chinese smartphone security specialist, spotted the two viruses late last week and recommends that users should check their mobile bills regularly for any unexplained charges.

According to NetQin, once installed SW.SecurePhone will run in the background without any icon being displayed and will monitor the phone, as well as collecting data to save on the SD card.

"The data - including messages, call log, location of the phone, recorded sounds around the phone and pictures in the phone - will then be uploaded to a remote server every 20 minutes. This will compromise privacy as well as use up internet traffic", says the firm.

"This virus is mainly distributed in the US through downloading from the internet", the firm adds.

SW.Qieting, meanwhile, is said to automatically forward messages received to a monitoring phone without the user being aware.

The malware is difficult to detect, says the company, since there is no icon displayed on the Android handset's screen following installation.

These two viruses, says NetQin, are proof that security threats in the wild are now a real threat.

As a result of its discoveries, the firm recommends that Android users should only download applications from trusted sources and always check reviews, ratings and developer information before downloading.

Android users should also never blindly accept application requests, and closely monitor permissions requested by any application.

"An application should not request to do more than what it offers in its official list of features", the company notes.

NetQin is recommending that users should install a trusted security application, such as its own www.netqin.com/en/antivirus/Mobile Antivirus 4.6 app, for real-time security and protection on their Android mobile.

This article is featured in:
Wireless and Mobile Security

 

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×