Red Alert 2.0 Android Trojan Offered on The Hacker Markets

Red Alert 2.0 Android Trojan image sensorstechforum com

Security experts have discovered that a new threat has appeared on the hacker underground markets called the Red Alert 2.0 Android Trojan. It is an updated version of a previous virus made for the mobile operating system which can cause significant damage to the infected hosts.

Red Alert 2.0 Android Trojan For Sale

Recently security researchers discovered a dangerous attack campaign carrying a sophisticated Android Trojan, the subsequent analysis reveals that it is a new version of a previous known threat. The new virus is called the Red Alert 2.0 Android Trojan and its main delivery technique at the moment seems to be the use of email SPAM messages. The hacker operators utilize social engineering tactics in order to persuade the intended victims into downloading and running the instances. They may be either directly attached or hyperlinked in the body contents.

The analysis reveals that various versions of it are being offered on the hacker underground markets for a monthly access prise of $500. The fact that we are already seeing attacks carrying it shows that the hackers on both sides (the creators and the clients) are actively using it as a formidable weapon against individual users, companies and even government facilities. The performed security analysis confirms that that it is an original creation and does not share any code with any of the other famous Android Trojan instances.

It appears that the Android Trojan targets mainly banking users located in countries like such as: Australia, Austria, Canada, Czech Republic, Poland, Denmark, Germany, France, Lithuania, India, Italy, Ireland, Japan, New Zealand, Romania, Spain, Sweden, Turkey, United Kingdom, and the United States.

Red Alert 2.0 Android Trojan Capabilities

Upon execution the main infection engine (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Martin Beltov. Read the original post at: