The page may not load correctly.
サイバー犯罪者に悪用されるテクノロジーを解析することによって、今後の効果的なウイルス防御対策を策定することが可能になります。感染したシステムにおける各マルウェアの挙動およびその防御対策について、もっと詳しく知りたい方は、ぜひこのページをご覧ください。
A family of malicious programs for Android mobile devices. The malware can be incorporated into legitimate applications and games and can be distributed through various websites that host software and via Internet forums. These malicious programs can launch automatically on system startup. Moreover, they can gather various device-related information (for example, phone number, IMEI, device model, and OS version) and send it to a remote server.
The Trojans belonging to this family can install another malicious application on the compromised device. This application is, in fact, a backdoor that runs in background mode and can execute commands received from the command and control server. To install the backdoor without user knowledge, the malware exploits various Android vulnerabilities that help acquire root privileges. In order to get elevated privileges, these Trojans use exploits stored in their bodies.
However, later versions of Android.Gongfu Trojans utilize a different routine that looks as follows: instead of using exploits, they employ social engineering methods to force their victims grant these malicious programs necessary privileges.
Moreover, some modifications of Android.Gongfu have features—previously executed in Dalvik—implemented using Linux-native code. As a result, these Trojans do not need to download any additional applications.
統計データによると、5つの Android対応ソフトウェアのうち、1つのソフトウェアが脆弱性(「セキュリティホール」)を抱えています。こうした状況下では、サイバー犯罪者はモバイルデバイス上にトロイの木馬を仕掛け、それを操ることができます。
Dr.Web for Androidに含まれるSecurity Auditor が、デバイスのセキュリティ上の問題を検出し、問題および脆弱性に対処するソリューションを提供します。