|28 Feb 2014||#1|
| || |
Android Botnets Hop on the TOR Train
Botnet creators have attempted numerous tactics for hiding their presence, traffic and locations of their command and control (CnC) servers.
To this end, we have seen the development of such things as DGA or Domain Generation Algorithms, which dynamically create new CnC addresses that are pre-created by the botnet owners to have their traffic move frequently to avoid detection/blocking.
We have also seen the use of TOR, the anonymous “under-web” used to host CnC servers with little likelihood that the owners of the servers would be discovered.
Although most of these advancements in botnet technology have been made specifically for the desktop, we are seeing a huge push to employ these same tactics on mobile platforms such as Android.
Today, an article posted by Roman Unuchek of Kaspersky described the discovery of the first “TOR Trojan for Android” and how cyber criminals have taken the source code for Orbot, a TOR network client for Android, and modified it with malicious functionality, such as that a Bot would have.
|My System Specs|
|Similar help and support threads for2: Android Botnets Hop on the TOR Train|
|First case of Android Trojan spreading via mobile botnets discovered||Security News|
|Transform Windows 7 Into Android-Like Look With Android Skin Pack||Themes and Styles|
|Train Windows To Do What You Want It Too||General Discussion|
|Train hits baby carriage!||Chillout Room|
|Train Parking.||Chillout Room|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 09:04 PM.