Trojan Horse by Keithwormwood

DualToy trojan hits Windows to reach iOS & Android devices

DualToy: A new trojan is targeting Windows computers to serve malicious applications on Android and iOS devices that the victim connects to the infected system via USB cables.

The trojan is called DualToy and was first detected in January of 2015. In its original form, it was able to only infect Android devices.

DualToy has since been updated so it can also infect iOS devices. According to security firm Palo Alto Networks, the number of different samples of the malware has currently reached 8.000 coma.

DualToy Trojan Horse by Keithwormwood
by Keithwormwood

DualToy is written in C++ and Delphi, and the first thing it does after the one is to download and install Android Debug Bridge (ADB) and iTunes toy drivers for Windows.

The trojan assumes that each device connected to the computer is the owner's device. So he uses files the corresponding license he has discovered on the user's computer trying to override the authentication of the mobile device connected via a USB port.

After successfully accessing the device, DualToy communicates with a C&C server, downloads a list of applications to install them, and then installs them on the victim device.

To avoid complications during the application installation process on Android devices, DualToy also downloads a special script from the C&C server. This script roots the device and gives DualToy the ability to install applications without the need for user interaction.

For iOS devices, the Trojan downloads and runs a script that collects various of the device, such as: IMEI, IMSI, ICCID, serial number and phone number. The purpose of this function is currently unknown.

On iOS devices, DualToy also collects the Apple ID along with the user's password.

All applications installed by DualToy are used to display ads that generate profits for the Trojan administrator.

"Although the ability of this attack can be further limited by additional mechanisms (eg, by activating the ADB and iOS sandbox) DualToy reminds us again that attackers can use USB to reach mobile devices and how malware can be transmitted across different platforms, ”said Claud Xiao, security researcher at Palo Alto Networks.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).