• News
  • 7 February, 2012
Share

Another Android Malware threat detailed by NCSU that could bypass Google Bouncer

It really is true what they say, it only takes one person to ruin it for everyone. Just when you thought it was safe to unlock the doors and catch a glimpse of the sun because Google Bouncer is making his rounds, someone kicks his butt. According to Forbes, a North Carolina State University professor and his team detailed how to do it on his blog. So not only did some smart-ass already find a loophole, he has taken it upon himself to help the guys that couldn’t figure it, we are all doomed.

They discovered a new malware threat that after being installed can evade virus scans and permissions requests. Meaning Google bouncer wont see their ID is fake and let them get wasted inside. After inside your device kicking it with his new buddies, he will make a quick call to a server and download some new buddies (code) to crash the party. This process can be triggered days, weeks or even months later. Hiding the data transfer in the phones communications.

Sounds pretty nefarious to me. To make matters worse, the downloaded code has a name that we have all heard in the past, “GingerBreak.”Giving the evil doers complete access to your device without your knowledge. Often times calling paid numbers, reading data or listening through the microphone to your most darkest secrets, or just your lame conversation at the pub.

As it sits right now though, the U.S. is currently safe. At least for now. The Rootsmart wasn’t found in the official Android Market, only in a Chinese app download site. Not sure how they can tell, since its primary goal is to ‘EVADE’ detection and install to your device, but that’s what the good people at Forbes are saying. NCSU’s Jiang seems to agree with me - “At the very least, this would cause some challenges for a Bouncer-like system,” he says. “I expect we’ll see more of this in the future.”

Via Forbes