Ερευνητές ασφαλείας από την Kaspersky εντόπισαν το πρώτο Android Tor-based Trojan. The Trojan has been named Backdoor.AndroidOS.Torec.a, and it uses the Tor anonymous network to hide its communications.
According to experts, Torec.a is based on Orbot, an open source Tor client for Android mobile devices.
Orbot's functionality serves to send commands from the Trojan's command and control (C&C) server. The list of commands it takes malicious software, includes the blocking of incoming SMS, the subtheft of incoming SMS, retrieving information about the phone and installed applications, and sending SMS messages to a specific number.
Using Tor to communicate with C&C has several advantages, such as the fact that the communications infrastructure is harder to disrupt and trace. On the other hand, experts emphasize that its developers malware they have developed more code to implement the use of Tor than the functionality of the Trojan itself.
Additional details about Backdoor.AndroidOS.Torec.a are available at Kaspersky blog.