Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Malware

First Android Trojan to hide Behind TOR

Paul Anderson by Paul Anderson
February 24, 2014 - Updated on May 17, 2022
in Malware, Mobile Security, Security
0
2939366 1371750068325
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Researchers at Kaspersky Labs have discovered the first TOR-based trojan for Android operating systems.  The malware was given the name Backdoor.AndroidOS.Torec.a, has its command-and-control (C&C) servers shielded by TOR’s network making it difficult for authorities to pinpoint the origin.

You might also like

Emotet now utilizing Onenote for its spam campaigns

Pompompurin of BreachForums Arrested and Charged

Netwire RAT seized by FBI and other worldwide police agencies

Roman Unuchek, a malware researcher at Kaspersky blogged about this new threat, Torec.a relies upon Orbot, an open-source Tor client for Android operating systems.

Orbot is leveraged to transmit commands from the C&C server to the Trojan. Their list of commands consists of intercepting incoming SMSs, stealing incoming SMSs, accessing details on the device as well as the installed applications, and sending SMSs to a given number.

As you can see in the figure below, the malware’s parameters contain a .onion domain which is the universal top-level domain for TOR domains.

tor_backdoor_01s

 

The exploitation of the TOR network is nothing new, but we have been seeing a large increase of malware utilizing the network in recent years.

Tags: androidKaspersky labsmalwaretor
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Emotet now utilizing Onenote for its spam campaigns

by Kyle
March 26, 2023
0
Emotet now utilizing Onenote for its spam campaigns

The infamous Emotet malware has adopted a new tactic to spread its infection. Cybercriminals are now distributing the malware via email attachments in Microsoft OneNote format. The move...

Read more

Pompompurin of BreachForums Arrested and Charged

by Paul Anderson
March 17, 2023 - Updated on July 23, 2023
0
Pompompurin of BreachForums Arrested and Charged

On Wednesday afternoon, federal agents arrested a man in Peekskill, New York, for allegedly running a dark web data breach site known as "BreachForums." The suspect, Conor Brian...

Read more

Netwire RAT seized by FBI and other worldwide police agencies

by Christi Rogalski
March 16, 2023
0
Netwire RAT seized by FBI and other worldwide police agencies

The FBI, in partnership with several police agencies worldwide, has carried out an international law enforcement operation resulting in the arrest of a suspected administrator of the NetWire...

Read more

The Emotet botnet returns and is sending a slew of malicious emails

by Kyle
March 14, 2023
0
The Emotet botnet returns and is sending a slew of malicious emails

The notorious Emotet botnet, considered one of the biggest threats to internet security, has resurfaced after a prolonged hiatus, armed with new tactics. The botnet's trademark strategy of...

Read more

Update-resistant malware infects SonicWall security appliances

by Paul Anderson
March 12, 2023
0
Update-resistant malware infects SonicWall security appliances

Researchers have discovered that threat actors linked to the Chinese government are using malware to infect SonicWall's Secure Mobile Access 100, a popular security appliance, which remains active...

Read more
Next Post
Pony stealer takes $220k worth of Cryptocurrency

Pony stealer takes $220k worth of Cryptocurrency

Related News

Emotet now utilizing Onenote for its spam campaigns

Emotet now utilizing Onenote for its spam campaigns

March 26, 2023
ChipMixer platform tied to crypto laundering scheme – seized by authorities

ChipMixer platform tied to crypto laundering scheme – seized by authorities

March 17, 2023
NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.