Dendroid (malware)
{{Short description|Android based malware}}
Dendroid is malware that affects Android OS and targets the mobile platform.{{cite web | url=https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=a29d7d7a-f150-46cf-9bb9-a1f9f4d32a80&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments | title=Android RATs Branch out with Dendroid | publisher=Symantec | date=5 March 2014 | access-date=23 October 2016 | author=Coogan, Peter}}
It was first discovered in early of 2014 by Symantec and appeared in the underground for sale for $300.{{cite web | url=http://securityaffairs.co/wordpress/22848/cyber-crime/dendroid-new-android-rat.html | title=Dendroid – A new Android RAT available on the underground | publisher=securityaffairs.co | date=March 7, 2014 | accessdate=23 October 2016 | author=Paganini, Pierluigi}}
Certain features were noted as being used in Dendroid, such as the ability to hide from emulators at the time.{{cite web | url=https://www.bluecoat.com/security-blog/2014-05-27/dendroid-under-hood-%E2%80%93-look-inside-android-rat-kit | title=Dendroid under the hood – A look inside an Android RAT kit | publisher=Blue Coat Labs | date=May 27, 2014 | accessdate=23 October 2016 | author=Leder, Felix}}
When first discovered in 2014 it was one of the most sophisticated Android remote administration tools known at that time.{{cite web | url=https://www.helpnetsecurity.com/2014/03/07/dendroid-spying-rat-malware-found-on-google-play/ | title=Dendroid spying RAT malware found on Google Play | publisher=helpnetsecurity.com | date=March 7, 2014 | accessdate=23 October 2016 | author=Zorz, Zeljka}}
It was one of the first Trojan applications to get past Google's Bouncer and caused researchers to warn about it being easier to create Android malware due to it.{{cite web | url=http://www.pcworld.com/article/2105500/new-crimeware-tool-dendroid-makes-it-easier-to-create-android-malware-researchers-warn.html | title=New crimeware tool Dendroid makes it easier to create Android malware, researchers warn | publisher=PC World | date=Mar 6, 2014 | accessdate=23 October 2016}}
It also seems to have followed in the footsteps of Zeus and SpyEye by having simple-to-use command and control panels.{{cite web | url=https://www.mysonicwall.com/sonicalert/searchresults.aspx?ev=article&id=718 | title=Source Code leaks for Android RAT Dendroid | publisher=mysonicwall.com | date=Aug 29, 2014 | accessdate=23 October 2016}}
The code appeared to be leaked somewhere around 2014.{{cite web | url=http://www.securityweek.com/source-code-android-rat-dendroid-leaked-online | title=Source Code of Android RAT Dendroid Leaked Online | publisher=securityweek.com | accessdate=23 October 2016 | author=Kovacs, Eduard| date=20 August 2014 }}
It was noted that an apk binder was included in the leak, which provided a simple way to bind Dendroid to legitimate applications.
It is capable of:
- Deleting call logs
- Opening web pages
- Dialing any number
- Recording calls
- SMS intercepting
- Uploading images and video
- Opening an application
- Performing denial-of-service attacks
- Changing the command and control server{{cite web | url=http://thehackernews.com/2014/03/symantec-discovered-android-malware.html | title=Symantec discovered Android Malware Toolkit named Dendroid | publisher=thehackernews.com | date=March 5, 2014 | accessdate=23 October 2016 | author=Wei, Wang}}
See also
- Botnet
- Mirai
- Shedun
- Zombie (computer science)
- Kill system
References
{{Reflist}}
{{Hacking in the 2010s}}
Category:Android (operating system) malware