The page may not load correctly.
分析不法分子使用的技术可以使我们预测其可能的发展方向,以便更加有效地抵御今后可能遇到的威胁。您也可以了解一下恶意程序如何在被感染的系统中运行以及如何抵御这些程序。
A family of malicious programs for Android mobile devices. The malware can be incorporated into legitimate applications and games and can be distributed through various websites that host software and via Internet forums. These malicious programs can launch automatically on system startup. Moreover, they can gather various device-related information (for example, phone number, IMEI, device model, and OS version) and send it to a remote server.
The Trojans belonging to this family can install another malicious application on the compromised device. This application is, in fact, a backdoor that runs in background mode and can execute commands received from the command and control server. To install the backdoor without user knowledge, the malware exploits various Android vulnerabilities that help acquire root privileges. In order to get elevated privileges, these Trojans use exploits stored in their bodies.
However, later versions of Android.Gongfu Trojans utilize a different routine that looks as follows: instead of using exploits, they employ social engineering methods to force their victims grant these malicious programs necessary privileges.
Moreover, some modifications of Android.Gongfu have features—previously executed in Dalvik—implemented using Linux-native code. As a result, these Trojans do not need to download any additional applications.
据统计,每五个安卓程序中就有一个存在漏洞(换句话说就是带有缺陷),这种漏洞可使不法分子将移动木马成功嵌入设备并执行所需操作。
Dr.Web for Android中的安全审计 对移动设备的安全性做出诊断和分析,发现问题和漏洞是会提示解决方案。