RCSAndroid - one of the most professionally developed and sophisticated Android malware
9 years ago | 7413 Views
Trend Micro researchers found that among the leaked files is the code for Hacking Team’s open-source malware suite RCSAndroid (Remote Control System Android), which was sold by the company as a tool for monitoring targets.
The RCSAndroid code can be considered one of the most professionally developed and sophisticated Android malware ever exposed. The leak of its code provides cybercriminals with a new weaponized resource for enhancing their surveillance operations.
Should a device become infected, this backdoor cannot be removed without root privilege. Users may be required the help of their device manufacturer to get support for firmware flashing.
Take note of the following best practices to prevent this threat from getting in your device... Read more at: http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/
1
Tags: malware, backdoor, hacking, remote control system, Android, security
Comments
Anonymous user 9 years
Interestingly, one unused feature of the Remote Control System Android is its ability to manipulate data in the Android package manager to add and remove permissions and components as well as hide the app icon.
secnews's iBlogs
What iBlog
-
RCSAndroid - one of the most professionally developed and sophisticated Android malware
Posted: 2015 July 23 | 7413 Views -
Boeing subsidiary Insitu would like to be able to deliver spyware via drone
Posted: 2015 July 20 | 5809 Views -
Mobile Spy Software Maker mSpy Hacked
Posted: 2015 May 17 | 16772 Views -
Critical “Ghost” Remote Code Execution Vulnerability
Posted: 2015 February 01 | 9181 Views -
Awful things are what happens
Posted: 2015 January 16 | 6890 Views -
Four in 10 Americans face regular online fraud attacks
Posted: 2014 October 24 | 10098 Views -
The Zero-day vulnerability CVE-2014-4114 impacting all versions of Microsoft Windows
Posted: 2014 October 16 | 10750 Views -
The NSA Gets an OK for Telephony Metadata Collection Yet Again
Posted: 2014 July 09 | 10743 Views -
Yet another wave of digital destruction is coming
Posted: 2014 March 02 | 11905 Views -
Internet Monitoring and Brand Protection
Posted: 2014 January 13 | 9237 Views -
Computer Threat 3rd Quarter 2013 McAfee Report
Posted: 2013 November 20 | 6432 Views -
NSA: The Future Of Cloud Computing In U.S.
Posted: 2013 October 23 | 7591 Views -
The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail
Posted: 2013 October 15 | 17333 Views -
New Intel Chips Contain Back-Door Processor
Posted: 2013 September 23 | 7950 Views -
New Version of ESET Social Media Scanner
Posted: 2013 September 17 | 6594 Views -
Trend Micro warns of new spam campaign
Posted: 2013 September 16 | 7314 Views -
FBI Admits It Controlled Tor Servers
Posted: 2013 September 16 | 6383 Views -
Latest Java update will block exploits
Posted: 2013 September 16 | 6441 Views
Categories