blog trackingRealtime Web Statistics angry Archives - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘angry’

Angry Birds website defaced following reports it enables…

Angry Birds website defaced following reports it enables government spying – via Arstechnica View full post on Your Anon News Read More….

View full post on The Cyber Wars

Caught in the ACTA: More angry protests break out in Poland

More angry protests have broken out in Poland, after the government gave its support to an international anti-piracy treaty. Activists say the pact, known as…

________________________ – – –

anonymous 2012 Mike Bost angry outburst explained

Freedom informant network – FIN – BROTHERS AND SISTERS UNITE!!! ***Visit channel for more videos*** Original video – https We do not forgive. We do not forget. We are anonymous. Government. Expect us Read more….

View full post on Anonymous Daily

Fake Angry Birds app cost UK Android users £28,000

In the most serious mobile malware incident yet to be uncovered in the UK a firm has been fined £50,000 by the regulator for distributing bogus apps that covertly sent SMS messages costing £5 a time to a premium rate number. View full post on…

View full post on National Cyber Security

Video: Angry Birds Space Trojan & Drive-by Android

On Monday, we released our Mobile Threat Report for Q1, and in that report we mention there’s a growing number of mobile trojans that “deliver on their promises”. What do we mean by …

View full post on National Cyber Security

Angry Birds tops corporate mobile blacklist, Facebook, YouTube follow

Research by mobile device management firm Zenprise found that Angry Birds was the most-blacklisted application among users enrolled in its Zencloud MDM service

View full post on security

View full post on National Cyber Security » Computer Hacking

Warning: Beware of Fake Angry Birds Space Versions

There’s a fake version of Angry Birds Space in Google Play (formerly known as the Android Marketplace), containing infectious malware. Rovio warns users not to be fooled.

View full post on Security News Headlines – Yahoo! News

View full post on National Cyber Security

Criminals Hide Malware in Version of ‘Angry Birds: Space’

A version of the hit game Angry Birds: Space that’s been seeded with malware has been discovered in the wild, although only the adventurous may risk being infected.

SophosLabs analyst Graham Cluley said that his organization discovered versions of Angry Birds: Space that made their way into “unofficial Android app stores,” according to a blog post Cluley authored.

It wasn’t immediately clear what “unofficial Android app stores” to which Cluley was referring; he was unable to be reached after hours in England. Technically, there is only one official Android app store: Google Play, formerly known as the Android Market.

To enable purchases and download apps from alternative stores like Amazon, for example, users need to check the box marked “Unknown sources,” allowing installation of non-Market applications. Cluley did not identify Amazon as a source of the malware-infected app, however.

If a user does download a version of the game from a unauthorized site, this is what the user risks, according to Cluley:

“The Trojan horse, which Sophos detects as Andr/KongFu-L, appears to be a fully-functional version of the popular smartphone game, but uses the GingerBreak exploit to gain root access to the device, and install malicious code.”

The Trojan communicates with a remote website in an attempt to download and install further malware onto the compromised Android smartphone, hiding its payload at the end of a JPEG image file.

“Effectively, your Android phone is now part of a botnet, under the control of malicious hackers,” Cluley wrote.

Angry Birds: Space, designed by Rovio, reached 10 million downloads in three days, and 20 million downloads within a week, according to Rovio.

For more from Mark, follow him on Twitter @MarkHachman.

View Slideshow
See all (10) slides


For the top stories in tech, follow us on Twitter at @PCMag.

Article source:,2817,2402966,00.asp?kc=PCRSS03069TX1K0001121

View full post on National Cyber Security » Virus/Malware/Worms

Android malware poses as Angry Birds Space game

Android malware authors have seized an opportunity to infect unsuspecting smartphone users with the launch of the latest addition to the immensely popular “Angry Birds” series of games.Android malware poses as Angry Birds Space game, Blog, malware, Android, game, poses, angry, space, birds

View full post on Naked Security – Sophos

View full post on National Cyber Security

New malware hides in ‘Angry Birds Space’

Android users and Angry Birds addicts, be warned. A new malware threatens phones and tablets running Google’s OS by hiding inside a copy of the popular game. And it can wreak havoc even without user intervention.

Mobile security firm Lookout said the malware is a new variant of the “Legacy Native (LeNa)” malware, which uses the “GingerBreak” exploit to attack.

“By employing an exploit, this new variant of LeNa does not depend on user interaction to gain root access to a device. This extends its impact to users of devices not patched against this vulnerability (versions prior to 2.3.4 that do not otherwise have a back-ported patch),” Lookout said in a blog post.

The malware hides in some apps, including a fully functional copy of the recently released – and immensely popular – Angry Birds Space.

“The authors are undoubtedly hoping to capitalize on the latest release from this popular franchise to increase uptake on distribution,” Lookout said.

It added that as of now, LeNa is not believed to have been in the Google Play market (formerly Android Market).

Lookout said LeNa originally masqueraded as a legitimate application and tried to trick a user into activating its malicious payload by invoking the SU (super-user) utility.

The SU utility is used by “rooted” users to selectively grant privileges to applications that request them.

Once the app gained root access, it functioned properly but also installed a binary file to the device granting remote control – including the ability to install additional software without any user notification.

At the time, the pool of users vulnerable to LeNA was relatively small since it depended on root access to run.

How it works

The new variant of LeNa hides its payload just past the “End of Image” marker of an otherwise fully-functional JPEG image file.

“As in its predecessor, this payload communicates with a remote Command and Control server and accepts instructions to install additional packages and push URLs to be displayed in the browser,” Lookout said.

At this time, LeNa’s CC seems to be focusing on pushing a single package to the device: com.the9.gamechannel, a Chinese-language alternative market that publishes Android games.

This package is installed without the user’s knowledge and subsequently launched.

“While it shares much of the same functionality as any mobile application store, this alternate market has not been designed to mimic the official Google Play market,” Lookout said.

Staying safe

Lookout advised Android users to be alert for unusual behaviors on their phones, which could indicate infection.

These behaviors may include strange charges to one’s phone bill, unusual SMS or network activity, or application activities that launch when the device is locked.

“Always check the permissions an app requests. Use common sense to ensure that the permissions an app requests match the features the app provides and remember to look at the developer name, reviews and star ratings,” it said.

“Only download apps from trusted sources, such as reputable app stores and download sites. Download a mobile security app for your phone that scans every app you download to ensure it’s safe. Lookout users automatically receive protection against this Trojan,” it added. — TJD, GMA News

Article source:

View full post on National Cyber Security » Virus/Malware/Worms

Page 1 of 212»

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?

Find Out More, Click Here!