The malware for Android uses old techniques, but new trick!
A sneaky Android malware disguises in file Microsoft Word to fool users to open it and trigger malicious code.
Η application imitates the early malicious circumstance Windows, using a common and well-known file icon to trick users into believing it is safe to interact with it.
As usual, malware arrives on the phone when users install applications from unofficial sources. If the user is careless and clicks on a Word file that appears from nowhere on his screen, then malware makes him believe that nothing has happened by displaying an error message indicating that the installation is not complete: "Installation errors, this software is not compatible with the phone."
While this occurs error pop-up, malware is shielded from dirty work by starting some hidden operations that could allow him to exploit various phone repos, extract information and control SMS and e-mail features.
That's it malware is actually one Android infostealer, filtering out SMS messages and contact lists. Her researchers Zscaler analyzed their source code and found that malicious software comes hardcoded with a phone number to which an SMS is sent with the mobile IMEI code.
In addition, an e-mail address along with its password, where malware sends e-mail to the contact list and victim's SMS messages, was also found.
Getting access to this email account, her researchers Zscaler found that around 300 + victims were infected and their data was stolen. The first emails were going back to 10 October this year. Also included is an additional call function. When attackers send a specially configured SMS to the victim's mobile, the malware receives and makes a call to a number in the SMS. This feature can be used for espionage in real time.
Because the application asks administrator rights when installed, users can remove it if they start their phone in safe fashion, disable the application from the settings and then uninstall it.