Menu
Android malware using TOR anonymity network makes a debut

Android malware using TOR anonymity network makes a debut

Using TOR makes it more difficult to trace the command-and-control server

A malware program for Android that uses the TOR network can collect SMSes and other sensitive data from a phone.

A malware program for Android that uses the TOR network can collect SMSes and other sensitive data from a phone.

Kaspersky Lab has spotted malware for the Android mobile operating system employing the TOR anonymity network, a development previously only seen on Windows.

TOR, short for The Onion Router, is software that offers users a greater degree of privacy when browsing the Internet by routing encrypted traffic between a user and a website through a network of worldwide servers. TOR can also be used to host websites on a hidden network.

The Android malware uses a TOR website as a command-and-control server, wrote Roman Unuchek of Kaspersky. Command-and-control servers are used to send instructions to the malware.

Adding TOR functions to desktop malware programs is nothing new. The latest finding shows hackers are increasingly targeting powerful mobile devices, which often hold valuable personal data. The malware can intercept SMSes, and collect other data, such as a user's phone number, the device's IMEI and the country where the device is located and request GPS coordinates.

TOR-enabled websites, which included ones such as now defunct Silk Road marketplace, are denoted by ".onion" at the end of their URL. TOR websites are difficult to trace because the network masks the site's true IP address, making it difficult to know which hosting company supports it.

Unuchek wrote that using a TOR site as a command-and-control server makes it "impossible to shut down."

The malware, which Kaspersky calls "Backdoor.AndroidOS.Torec.a" uses a package of software, called Orbot developed by The TOR Project that enables TOR on Android.

The malware doesn't try to pretend to be Orbot in an attempt to get people to download it but instead "simply uses the functionality" of the Orbot client, Unuchek wrote.

Adam Kujawa, lead of the Malware Intelligence Team at Malwarebytes, wrote on his company's blog that the malware may be known as "Slempo" and be part of a botnet called "Stoned Cat." Advertisements seen by Malwarebytes show that the cost of renting the botnet is US$1,000 up front and then a $500 monthly subscription fee, he wrote.

Using TOR may make the malware's communication harder to trace but also puts a strain on a mobile device.

"We recommend keeping an eye out for any data usage increases from your mobile device, over-power consumption (running a constant TOR connection will no doubt drain your battery faster than otherwise) and any other kinds of odd behavior," Kujawa wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Android OSsecurityencryptionmalwarekaspersky lab

Slideshows

Meet the leading HP partners in New Zealand...

Meet the leading HP partners in New Zealand...

HP has recognised its top performing partners in New Zealand at the second annual 2016 HP Partner Awards, held at a glittering bash in Auckland. The HP Partner Awards recognises and celebrates excellence, growth, consistency and engagement of its top partners. This year also saw the addition of several new categories, resulting in 11 companies winning across 11 award categories.

Meet the leading HP partners in New Zealand...
Channel comes together as Ingram Micro Showcase hits Auckland

Channel comes together as Ingram Micro Showcase hits Auckland

Ingram Micro outlined its core focuses for 2017 at Showcase in Auckland, bringing together the channel for a day of engaging keynotes, compelling breakout sessions and new technologies.

Channel comes together as Ingram Micro Showcase hits Auckland
Show Comments