Mutated Android Trojan spotted in the wild

Share on facebook
Share on twitter
Share on linkedin
Share on whatsapp
Mutated Android Trojan spotted in the wild

Kapersky Lab has positively identified a third variant of the FakePlayer SMS Trojan targeted at Android devices.

According to Kapersky’s Denis Maslennikov, the latest iteration of the Trojan sends for-fee SMS/text messages to two short numbers: 7132 and 4161.

The cost for every SMS/text message remains a rather hefty $6, approximately 170 Russian rubles.

The current FakePlayer variant also features a “porno player” icon that was present in the first strain of the Trojan.

“There are no other changes. The same archive – pornplayer.apk, the same infection vector – via the Internet using SEO tricks and the same queries upon installation. So no real changes – just a new variant to earn additional money,” Maslennikov confirmed.

“[Still], everyone with a phone which supports J2ME should also beware: if you go to a website which is spreading Trojan-SMS.AndroidOS.FakePlayer.c using a mobile web browser, such as Opera Mini for instance, you will be offered a link to download a J2ME application – which happens to be a Trojan we detect as Trojan.SMS.J2ME.Small.r…”

Author