HijackRAT: Experts warn of "significant development" in mobile malware

 

Emma Lunn
Friday 22 August 2014 23:12 BST
Comments

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

The National Fraud Intelligence Bureau (NFIB) is warning of a new breed of malware developed for smartphones which run on the Android platform. Experts say HijackRAT is a "significant development" in mobile malware.

RAT stands for remote access tool. The malware siphons private data from the device, and goes after banking credentials by replacing banking apps with spoofed versions. Most Android malware will do just one of these things but HijackRAT combines all of these activities as well as deleting antivirus software.

It disguises itself as an app called "Google Service Framework", and the NFIB says the delivery method is not currently known. The main target seems to be mobile banking apps as it attacks two-factor authentication systems popular in mobile banking.

So far it has only targeted Korean banks but net security firm FireEye has warned that it could be adapted very easily. The NFIB advises mobile banking users on all platforms to download apps only from the official app store. Before downloading, check what access it requires. If it asks for access to areas which it shouldn't need, then be suspicious.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in