Trojan infection when using KakaoTalk

Trend Micro, a security firm in Japan, recently discovered KakaoTalk and many other messaging applications are becoming targets of hackers 'attacks, threatening users' information security.

One of the most sophisticated ways for hackers to attack users is to write a legitimate version of popular applications and add malicious code to it. This will create an application containing trojans, but users will not know what is the real version and what is the malicious version.

In the case of the recent discovery in Japan, the malicious trojan version of KakaoTalk was discovered named ANDROIDOS_ANALITYFTP.A. This version has been spread through email. If you compare detailed applications, users can see the differences between versions.

Trojan infection when using KakaoTalk Picture 1
Differences between legal (left) and malicious KakaoTalk versions (right).

In addition, users also have a way to distinguish between the original application version and the trojan version. It is trojan applications that always require more access than legitimate applications.

Trojan infection when using KakaoTalk Picture 2
The Trojan version always requires more permissions.

ANDROIDOS_ANALITYFTP.A is identified as a trojan of tracking nature. Taking advantage of the invariant in the Android programming language, Java, the attacker will set up applications that regularly send owners contact information, text messages . This data can become a platform. for the next attack.

Besides creating malicious trojan application versions, the fake application is also used in KakaoTalk case. About a month ago, KakaoTalk warned users, through their official Twitter account, about a "KakaoTalk Security Plugin".

Trojan infection when using KakaoTalk Picture 3
KakaoTalk notifications from Twitter.

This fake application is known as ANDROIDOS_FAKEKKAO.A. A lot of people have been tricked for being named KakaoTalk, and then "Security" feels safe for users to download.

Trojan infection when using KakaoTalk Picture 4
Fake software is inserted into legitimate software.

Prevention:

The best way to prevent these threats is to avoid downloading applications outside of Google Play. Even, users should check the legality of current applications, to detect trojan versions. In addition, using a security solution like Trend Micro Mobile Security for mobile devices is also a must.

Besides the wise use of users, the responsibility of the application developers should also be emphasized. When creating and deciding to market, developers need to evaluate software, this application is at risk of being exploited, installing trojans or not. This not only helps users, but will also affect the reputation of the application developer itself.

3.7 ★ | 6 Vote

May be interested

  • Appeared trojan trojan antivirus tool for mobileAppeared trojan trojan antivirus tool for mobile
    this trojan called doomboot.g specializes in pretending to be an antivirus application called exovirusstop by exosyphen studios. jarno niemela, a virus researcher with security firm f-secure, said that this was the first trojan to attack
  • Microsoft warned the Emotet trojan back on a large scale, stealing the victim's banking informationMicrosoft warned the Emotet trojan back on a large scale, stealing the victim's banking information
    after 5 months of silence, from february 2020 until now, the emotet trojan has just officially returned with a larger scale.
  • Carefully stolen information with Trojan - How to disable TrojanCarefully stolen information with Trojan - How to disable Trojan
    you are using the internet with a password only you know, but somehow you are still using someone else's account. you suspect your mailbox has been previewed by other people even though you did not go to a public internet service to get it, so you cannot reveal your login information. if so, it is very likely that your computer has been installed or infected with trojan.
  • The new Trojan BagleDl-U is spreading fastThe new Trojan BagleDl-U is spreading fast
    a new trojan appears to have infected millions of e-mails globally over the past two days. this trojan, called bagledl-u, also has the ability to disable security tools running on your computer.
  • Trojan-Downloader_Win32_Agent.nmiTrojan-Downloader_Win32_Agent.nmi
    the trojan downloads another program through the internet and launches it on the victim's computer without the user's knowledge or permission.
  • The intense revival of Briz TrojanThe intense revival of Briz Trojan
    security firm panda software has just warned of the emergence of a new variant of the trojan horse. trojans briz is a trojan specializing in stealing passwords and online bank account details of users.
  • How trojan pretends to be a PDF file using the RLO . methodHow trojan pretends to be a PDF file using the RLO . method
    you cannot guarantee that a file is really an image, video, pdf or text file just by looking at the file extension. on windows, an attacker can execute a pdf file as if it were an exe file.
  • Cocktails can help prevent septic shockCocktails can help prevent septic shock
    in low-income countries, mortality from septicemia / sepsis - a strong reaction to infections that cause tissue damage, organ failure and death - can exceed 60% and 400,000 people die each year in the united states.
  • How to Prevent an Eye InfectionHow to Prevent an Eye Infection
    while most eye infections don't cause serious or permanent damage, they tend to spread easily and cause a great deal of discomfort. good hygiene, including good eye hygiene, is the best way to avoid getting or spreading an eye infection....
  • A fake trojan appears Microsoft WordA fake trojan appears Microsoft Word
    security experts are now warning users of a new trojan hidden in microsoft word files that are spreading widely through a spam campaign. the kukudro-a trojan often falsely provides information about property