La mia libreria
La mia libreria

+ Aggiungi alla libreria

Supporto
Supporto 24/7 | Regole per contattare

Richieste

Profile

Libreria dei virus

L’analisi delle tecnologie utilizzate dai malfattori ci permette di trarre conclusioni su possibili vettori dello sviluppo del settore dei virus affinché possiamo affrontare le minacce future in modo ancora più efficace. Scoprite anche voi come funzionano in sistemi infetti determinati programmi malevoli e come affrontarli.

Program.Algo360 nella libreria di virus:

Program.Algo360 is a special SDK designed to create users’ credit score based on their personal data. This software module is popular among Indian financial organizations which integrate it into their apps.

Depending on it’s version, module collects various information. Collected data is accumulated in JSON files, packed into ZIP archive and then uploaded onto developer’s server.

Among all known modifications of this SDK, the largest amount of data is collected by the module built into the Eduvanz application. Further example below will be based on this particular app.

  • SHA1: bc05ccaee5298f4e46fdccf73c1f1903fcb05432
  • Package name: com.eduvanzapplication
  • Version: 5.1.5

Upon first launch the app notifies user about collecting data and asks to agree with terms and conditions:

screenshot Program.Algo360 #drweb screenshot Program.Algo360 #drweb screenshot Program.Algo360 #drweb

Program.Algo360 module built into it collects the information as follows:

  • SMS, if one of the following conditions is met:
    • mobile phone number is based on 10 or less digits;
    • mobile phone number does not have +91 sequence in it. As a result, module will collect information about SMS received from any mobile numbers but the Indian mobile numbers;
  • names and types of all user accounts stored on the device;
  • the list of installed applications and Internet usage statistics for each of them;
  • the information about the device: device model name, manufacturer, IMEI, mobile operator name;
  • battery status: current time, charge level, whenever the USB cable is plugged in;
  • web browser bookmarks: title, url, creation date;
  • user calendar entries: events participants (their email, names, status), header, time, organizer, ID;
  • calls log: phone number, calling date, the lengh and the type of the call, entry ID in the calls log;
  • contacts from the phone book: name, phone number;
  • device geolocation information, and
  • SIM card data: slot which is currently in use, IMSI, IMEI, mobile operator name, mobile phone number, current time.

Vulnerabilità per Android

Secondo le statistiche ogni quinto programma per SO Android contiene una vulnerabilità (ovvero un "buco"), il che permette ai malfattori di introdurre con successo trojan mobili sui dispositivi e di eseguire le azioni richieste.

Auditor di sicurezza in Dr.Web per Android farà la diagnostica e l’analisi della sicurezza del dispositivo mobile, proporrà soluzioni per risolvere i problemi e le vulnerabilità rilevate.