Mutated Android Trojan spotted in the wild

  • Kapersky Lab has positively identified a third variant of the FakePlayer SMS Trojan targeted at Android devices.

    According to Kapersky's Denis Maslennikov, the latest iteration of the Trojan sends for-fee SMS/text messages to two short numbers: 7132 and 4161.

    The cost for every SMS/text message remains a rather hefty $6, approximately 170 Russian rubles.

    The current FakePlayer variant also features a "porno player" icon that was present in the first strain of the Trojan.

    "There are no other changes. The same archive - pornplayer.apk, the same infection vector - via the Internet using SEO tricks and the same queries upon installation. So no real changes - just a new variant to earn additional money," Maslennikov confirmed.

    "[Still], everyone with a phone which supports J2ME should also beware: if you go to a website which is spreading Trojan-SMS.AndroidOS.FakePlayer.c using a mobile web browser, such as Opera Mini for instance, you will be offered a link to download a J2ME application - which happens to be a Trojan we detect as Trojan.SMS.J2ME.Small.r..."