Jump to content

Dendroid (malware): Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m added category
m (edited with ProveIt)fixed reference
Line 1: Line 1:
'''Dendroid''' is [[malware]] that affects Android OS and targets the mobile platform.<ref>http://www.symantec.com/connect/blogs/android-rats-branch-out-dendroid</ref>
'''Dendroid''' is [[malware]] that affects Android OS and targets the mobile platform.<ref>{{cite web | url=https://www.symantec.com/connect/blogs/android-rats-branch-out-dendroid | title=Android RATs Branch out with Dendroid | publisher=[[Symantec]] | date=5 March 2014 | accessdate=23 October 2016 | author=Coogan, Peter}}</ref>


It was first discovered in early of 2014 by Symantec and appeared in the underground for sale for $300.<ref>http://securityaffairs.co/wordpress/22848/cyber-crime/dendroid-new-android-rat.html</ref>
It was first discovered in early of 2014 by Symantec and appeared in the underground for sale for $300.<ref>http://securityaffairs.co/wordpress/22848/cyber-crime/dendroid-new-android-rat.html</ref>

Revision as of 14:16, 23 October 2016

Dendroid is malware that affects Android OS and targets the mobile platform.[1]

It was first discovered in early of 2014 by Symantec and appeared in the underground for sale for $300.[2] Some things were noted in Dendroid, such as being able to hide from emulators at the time.[3] When first discovered in 2014 it was one of the most sophisticated Android remote administration tools known at that time.[4] It was one of the first Trojan applications to get past Google's Bouncer and caused researchers to warn about it being easier to create Android malware due to it.[5] It also seemed to follow in the footsteps of Zeus and SpyEye by having simple-to-use command and control panels.[6] The code appeared to be leaked somewhere around 2014.[7] It was noted that an apk binder was included in the leak, which provided a simple way to bind Dendroid to legitimate applications.

It is capable of:

  • Deleting call logs
  • Opening web pages
  • Dialing any number
  • Recording calls
  • SMS intercepting
  • Upload images, video
  • Opening an application
  • Able to perform a denial-of-service attack attack
  • Can change the command and control server[8]

See also

References

  1. ^ Coogan, Peter (5 March 2014). "Android RATs Branch out with Dendroid". Symantec. Retrieved 23 October 2016.
  2. ^ http://securityaffairs.co/wordpress/22848/cyber-crime/dendroid-new-android-rat.html
  3. ^ https://www.bluecoat.com/security-blog/2014-05-27/dendroid-under-hood-%E2%80%93-look-inside-android-rat-kit
  4. ^ https://www.helpnetsecurity.com/2014/03/07/dendroid-spying-rat-malware-found-on-google-play/
  5. ^ http://www.pcworld.com/article/2105500/new-crimeware-tool-dendroid-makes-it-easier-to-create-android-malware-researchers-warn.html
  6. ^ https://www.mysonicwall.com/sonicalert/searchresults.aspx?ev=article&id=718
  7. ^ http://www.securityweek.com/source-code-android-rat-dendroid-leaked-online
  8. ^ http://thehackernews.com/2014/03/symantec-discovered-android-malware.html