First Android bootkit has infected 350,000 devices

January 24, 2014

Russian anti-virus company Doctor Web is warning users about a dangerous Trojan for Android that resides in the memory of infected devices and launches itself early on in the OS loading stage, acting as a bootkit. This allows the Trojan to minimize the possibility that it will be deleted, without tampering with the device’s file system. Currently, this malignant program is operating on more than 350,000 mobile devices belonging to users in various countries, including Spain, Italy, Germany, Russia, Brazil, the USA and some Southeast Asian countries.

To spread the Trojan, which entered the Dr.Web virus database as Android.Oldboot.1.origin, attackers have used a very unusual technique, namely, placing one of the Trojan components into the boot partition of the file system and modifying the init script which is responsible for the initialisation of OS components. When the mobile phone is turned on, this script loads the code of the Trojan Linux-library imei_chk (Dr.Web Anti-virus detects it as Android.Oldboot.1), which extracts the files libgooglekernel.so (Android.Oldboot.2) and GoogleKernel.apk (Android.Oldboot.1.origin) and places them in /system/lib and /system/app, respectively. Thus, part of the Trojan Android.Oldboot is installed as a typical application which further functions as a system service and uses the libgooglekernel.so library to connect to a remote server and receive various commands, most notably, to download, install or remove certain applications. Reflashing a device with modified firmware that contains the routines required for the Trojan’s operation is the most likely way this threat is introduced.

This malware is particularly dangerous because even if some elements of Android.Oldboot that were installed onto the mobile device after it was turned on are removed successfully, the component imei_chk will still reside in the protected memory area and will re-install the malware after a reboot and, thus, re-infect the system.

According to information acquired by Doctor Web’s virus analysts, currently, this malignant program operates on more than 350,000 mobile devices belonging to users in various countries, including include Spain, Italy, Germany, Russia, Brazil, the USA and some Southeast Asian countries. However, most of the compromised devices (92%) are located in China, which is not surprising, since the Trojan Android.Oldboot is intended for Android-powered devices in China.

The geographical distribution of the compromised devices is shown on the following image.

To prevent infection by this malware or other similar Trojans, Doctor Web warns users against purchasing devices of unknown origin and using OS images from unreliable sources.

Share

Comments are closed.

Twitter widget by Rimon Habib - BuddyPress Expert Developer