Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 17 submissions in the queue.
posted by Dopefish on Sunday February 23 2014, @12:00PM   Printer-friendly
from the stick-to-a-real-human-teller dept.
berrance writes "ITworld reports that the source code for the Android mobile banking Trojan app "iBanking" has surfaced via an underground forum. The software has been masquerading as a security app appearing on banking sites, via HTML injection attacks. In addition to serving as a Trojan, this app is also a bot net client, which 'connects to a command-and-control server that allows attackers to issue commands to each infected device.'"
 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Funny) by Debvgger on Sunday February 23 2014, @01:46PM

    by Debvgger (545) on Sunday February 23 2014, @01:46PM (#5181)

    Download link is missing! :-)

    Starting Score:    1  point
    Moderation   +4  
       Funny=4, Total=4
    Extra 'Funny' Modifier   0  

    Total Score:   5  
  • (Score: 1) by jt on Monday February 24 2014, @01:24AM

    by jt (2890) on Monday February 24 2014, @01:24AM (#5426)

    In all seriousness I want to d/l this and take a look at the code. Do they pull any interesting tricks? Any non-obvious techniques I could borrow for my non-malware apps? I learned a lot of interesting tricks from studying rootkit and virus source over the years, even if I don't get to apply it very often.

    If nothing else, the 'know your enemy' idea is useful for anyone of use who will be tasked with defending our users against this kind of thing.