MENU × BUSINESS
Banking And InsuranceCryptocurrencyDigital MarketingErpFood And BeveragesHealthcareLegalMarketing And AdvertisingMedia And EntertainmentMetals And MiningOil And GasRetailTelecom
TECHNOLOGY
Artificial IntelligenceBig DataCloudCyber SecurityE CommerceEducationGaming And VfxIT ServiceMobileNetworkingSAPScience And TechnologySecuritySoftwareStorage
PLATFORM
CiscoDatabaseGoogleIBMJuniperM2MMicrosoftOracleOracleRed Hat
LEADERSHIP
CEO ReviewCompany Review
MAGAZINE
ASIA INDIA
STARTUPS CLIENT SPEAK CONTACT US

The Silicon Review Asia

Beware! Someone Might Be Recording Your Phone Calls

Beware! Someone Might Be Recording Your Phone Calls

Recently, security researchers at Cisco Talos have unearthed two variants of a new notorious Android Trojan that is spreading at a jet speed all over the internet. Disguised as a fake anti-virus for android phones, the application is known as "Naver Defender."

Tagged as KevDroid, the malware is a remote administration tool (RAT) developed to pwn Android devices and steal sensitive data. Also, this ill-famous malware is capable of recording phone calls. According to the Cisco Talos researchers’ detailed report, the two recent variants of KevDroid were detected in the wild after the discovery of the Trojan by a South Korean cybersecurity firm, EST Security several days ago.

Details of the two Variants:

Variant 1

The 1st variant of the malware is a smaller version. The prime purpose of this variant is to rob sensitive information stored on the device.

  • Installed apps
  • Phone number
  • Unique IDs
  • Location - collected every 10 seconds
  • Stored Contacts and SMS, Call logs, Emails, and Photos
  • Recording calls

Variant 2

The second variant of KevDroid is larger than the previous sample. Named as "PU," the icon of this sample is empty. Also, the architecture of the malware is a little bit different than the previous version and it uses SQLite databases to store information.

This variant contains all the features same as the previous version with some additional:

  • Camera recording
  • Audio recording
  • Web history stealing
  • File stealing
  • Root access on the device

So, in order to keep information safe and secure, Android users are advised to cross-check each and every application regularly to find and remove if any malicious, unknown or unnecessary application is installed on the phone without the user’s knowledge or consent.

YOU MAY ALSO LIKE

Tariff plans will cost higher from the next financial year as telecom companies are gearing up to increase rates

The ongoing Covid pandemic had significantly increased the number of mobile and internet users worldwide. The high amount of usage is expected to drop...

Business Travelers to Stay at Singapore’s Changi Airport Bubble

Singapore’s open economy depends heavily on tourism and business. But its vibrant but small economy has been hurting as the circumstances due to...

Countries in Asia-Pacific are marching towards ‘green recovery’ amidst Covid-19 crisis

2020 has been an unforgettable year for many of us. The ongoing Covid crisis has reminded people that it is very important to have an uninterrupted an...

Department of Telecommunication to announce the new schedule for 5G trials

Department of Telecommunications (DoT) is all set to announce the new schedule for 5G trials. The Dot made this decision after being pulled by the par...

RECOMMENDED