In the era of information transparency in the mobile Internet, user privacy has become the most sensitive topic in the public. With the growing popularity of Android, there are more and more "black hands" reaching out to Android users. Many applications steal users ' privacy without their knowledge, and upload them to related servers in real time. A humble mobile phone software allows you to do everything in the hands of others.
Recently, the domestic mobile anti-virus software-security Butler intercepted the "eavesdropping storm" series of Trojans, the Trojan is more unique, will be privately to monitor the mobile phone, greatly enhance the threat of user privacy. According to the An Tiuyun Security Center detection analysis, the current virus has infected nearly million mobile phone users.
Trojan Horse Behavior Analysis:
Behavior one, the Trojan is impersonating system components; boot from boot; no startup icon and startup interface; After installation, start the service privately in the background.
Act two, privately to mobile phone calls, SMS listening: When the mobile phone received a text message to read the message content, and write to the software with the database, listening to the status of the caller, under certain conditions triggered the recording behavior.
Behavior III, upload data (SMS and listen to data, etc.) to the specified server address. Trojan Author is fully prepared for the upload of privacy data, preset 4 server addresses, including a dynamically replaceable address.
Security Butler's Weapon:
Mobile security experts predict that in the future there will be more such or variant behavior of the virus, please early to defend the killing. Security Butler has achieved the "eavesdropping storm" series of precision killing Trojan, users can download the installation from the official website, and then use a quick scan or the whole killing, you can phone hidden virus to killing.
In addition, Android mobile phone users should develop a good mobile phone security awareness, in the download application must be vigilant, recommended to large, regular security mobile phone application store or forum to download, to prevent the mobile phone by Trojans, viruses steal privacy.
This article comes from the Http://www.mkddos.com/zixun/2012/1101/21.html DDoS Group specializes in providing DDoS attackers, DDoS attack software, DDoS attack tools and tutorials, as well as traffic attackers, web site attackers to download