A new sophisticated Android Bootkit has been detected by Chinese Security Researchers from “360 Mobile Security“, its name is Oldboot.B and appears as an evolution of its predecessor Oldboot.A. According the researchers Oldboot.B could be considerable as the most sophisticated Android malware ever detected, it has already infected millions of mobile devices. OldBoot.A was detected early 2014 by the Russian security firm Doctor Web, its principal capability is to re-infect the Smartphone after reboot, even if all its components are deleted by the user. Bootkit is a category of malware which infects the host at start-up and it is able to perform malicious activities, including data stealing, disk encryption, communicate with a remote C&C server and remove the application on the victim’s device. ‘Oldboot.B‘ implements a new advanced evasion techniques to avoid its detection to principal antivirus software and automatic analysis systems.
“The Oldboot Trojan family is the most significant demonstration of this trend.” “Depending on the commands sent from the C&C server, it can do many different things, such as sending fake SMS messages or phishing attacks, and so on. Driven by profit, the Oldboot Trojan family changes very fast to react to any situation.” researchers said.
The principal abilities of Oldboot.B trojan are:
The Oldboot.B malware, once infected the victim’s Android mobile, waits for the command sent by C&C (located at az.o65.org [IP is 22.214.171.124]), it makes also use of steganography to hide data (executable codes, configuration file) within file exchanged with C&C and installs numerous malicious applications on the mobile.
“But after some analysis, we found that the configuration of meta_chk is hidden in this picture, which contains the command will be executed by meta_chk and other information.” researchers said. The size of this configuration file is 12,508 bytes.
The Oldboot.B malware is composed of 4 principal components that registering itself as services can ensure the persistence to the malicious code.
The principal evasion capabilities that make hard the detection of Oldboot.B are:
The unique possibility to avoid Oldboot.B malware is to download and install app only from official stores neither use untrusted custom ROMs.
If your mobile is infected by Oldboot.B you can download the free removing tool designed by antivirus firm 360 Mobile Security.
(Security Affairs – Oldboot.B, Android malware)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.