----
*Lookout Discovers *
<http://www.xda-developers.com/lookout-discovers-trojanized-adware-that-secretly-acquires-root-access/>
*Trojanized*
<http://www.xda-developers.com/lookout-discovers-trojanized-adware-that-secretly-acquires-root-access/>*
Adware that Secretly Acquires Root Access*
<http://www.xda-developers.com/lookout-discovers-trojanized-adware-that-secretly-acquires-root-access/>
// *xda*
<http://www.xda-developers.com/lookout-discovers-trojanized-adware-that-secretly-acquires-root-access/>
*-developers*
<http://www.xda-developers.com/lookout-discovers-trojanized-adware-that-secretly-acquires-root-access/>

Publicly available root exploits are a godsend to consumers whose devices
are locked. Exploits such as Towelroot <https://towelroot.com/> easily
enabled any user running on Android version KitKat and below to acquire
root access with the click of a button. However, these methods are
considered “exploits” for a reason.

If an application like Towelroot can exploit your device’s firmware to
enable root access, what’s preventing a malicious third-party application
obtaining root access by tricking you? After all, thanks to these exploits
an application doesn’t have to ask the user to grant it root if it can
simply enable it on its own.

OEMs constantly update their supported devices to stamp out these exploits,
but often there are simply too many devices to maintain
<http://www.xda-developers.com/samsung-lists-devices-to-receive-monthly-security-updates/>.
In addition, new exploits are discovered  on a regular basis (some of which
we may not even be aware of!) leading to a never ending battle between
hackers looking to target people’s personal and financial details and OEMs
looking to protect their customers. It’s an OEMs worst nightmare to see
hackers target their customers, and there’s little they can do if those
hackers go after the customers that aren’t upgrading their devices or
aren’t sticking to first party application stores.

*Trojanized Adware*

Mobile security firm Lookout has just confirmed these fears
<https://blog.lookout.com/blog/2015/11/04/trojanized-adware/> in a
blog-post that unveils the widespread use of trojanized adware to
automatically gain root access upon user installation. The security
researchers discovered over 20,000 applications that include a form of
trojanized adware, some of which masquerade as popular apps like
CandyCrush, Facebook, Twitter, Snapchat, and WhatsApp. These infected
applications are often ripped straight from the Google Play Store and
repackaged with the adware to target unsuspecting users in third-party app
stores. Unlike most annoying adware attacks that can be quelled by
uninstalling the responsible app, these trojans utilize root access to
install themselves as system apps, preventing their uninstallation using
normal means.

Lookout’s research led it to discover three interconnected families of
adware – Shuanet, Kemoge, and Shedun. Though it’s hard to say whether or
not these three adware groups are directly related, it’s clear that there
was at least some collaboration involved given that these adware share much
of their code as well as utilizing most of the same publicly available root
exploits. Lookout discovered that these adware affect users in a wide
variety of areas, which is unsurprising given the large number of
third-party application repositories that are out there. However, the
company did not indicate whether or not any of they made their way onto the
Google Play Store. That’s not to say it’s not possible though, as Lookout
itself previously discovered
<https://blog.lookout.com/blog/2015/03/18/adware-google-play/>.

*What to Expect*

If you’re using a current generation device and have kept your device
up-to-date (whether officially or unofficially), you’re unlikely to
currently be at risk to any of these exploits — especially if you are an
educated user. However, as new exploits are discovered this may not hold
true. The best that you can do is to only install applications from trusted
sources and developers whenever possible (and no, an antivirus program such
as Lookout will not be able to do much for you here). If you do fall victim
to an attack by a trojanized adware, your only options to get rid of it
manually is to remove the app yourself using root access or to flash the
stock firmware from the manufacturer, overwriting the system partition.

This problem affects more than just the user – it has a ripple effect on
the entire ecosystem. Users with compromised devices may pose a security
threat to their places of employment if a malicious actor can access
enterprise apps. Developers of popular apps will suffer a hit in their
reputation if they get blamed for adware they had no part in spreading.
OEMs will suffer from users swearing off their latest devices due to having
a poor user experience for reasons they do not understand. We hope that
discoveries such as this will make OEMs take security more seriously for
ALL of their devices, not just their flagship ones.



----

Shared via *my feedly reader* <http://feedly.com>

-- 
==========
Beli paket data Internet Indosat cuma nge-tweet. 
Daftar #TWITBUY di www.indosat.com/twitbuy
Ikuti obrolannya di Forum ICITY  >> http://bit.ly/1UxYCDA
 
----------------------
Hanya dengan 500ribu bisa jadi reseller delcell.
Hubungi: [email protected]
----------------------
Bass Audio Headphone Store, Toko Headphone Earphone Terlengkap 
Kunjungi  >> http://bassaudio.net
----------------------
Kontak Admin, Twitter  @agushamonangan
-----------------------
FB Groups     :  https://www.facebook.com/groups/android.or.id

Aturan Umum  ID-ANDROID >> goo.gl/mL1mBT

==========
--- 
Anda menerima pesan ini karena Anda berlangganan grup "[id-android] Indonesian 
Android Community" dari Google Grup.
Untuk berhenti berlangganan dan berhenti menerima email dari grup ini, kirim 
email ke [email protected].
Kunjungi grup ini di http://groups.google.com/group/id-android.

Kirim email ke