IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 616
ANDROID MALWARE
Mohammed Tarwala1
, Munwar Hussain Shelia2
, Nazmuddin Mavliwala3
, Shabana Tadvi4
1
Student, Computer Engineering, MHSSCOE, Maharashtra, India
2
Student, Computer Engineering, MHSSCOE, Maharashtra, India
3
Student, Computer Engineering, MHSSCOE, Maharashtra, India
4
Assistance Professor, Computer Engineering, MHSSCOE, Maharashtra, India
Abstract
Now a day’s android devices are so common that they are used by everyone in the world. But with the commonness of the android OS
and Android based devices there comes a threat to these android devices. This paper will implement some of the threats to the
Android device and will also present their counter measures. First of all it will implement trivial malware attack on android device
and android OS like message stealing and contact stealing, files stealing from SD card and also their solutions to prevent it. Secondly
this project will perform more sophisticated attacks like whatsapp message stealing, using twitter as command and control in android
devices and using Web Based Remote Exploration and Control System, denial of convenience attacks using fake access point, phishing
attacks.
Keywords: Android Malware, Mobile Malware, Flaws in android Security Model, Web based exploitation, Application
phishing in android.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Android is everywhere Phones Tablets. TVs and set-top boxes
powered by Google TV. Soon, Android will be in cars and all
sort of other places as well. However, the general theme of
Android devices will be smaller screens and/or no hardware
keyboard. And, by the numbers, Android will probably be
associated mostly with smart phones for the foreseeable
future. For developers, this has both benefits and drawbacks,
as described next. This chapter also describes the main
components in an Android application and the Android
features that you can exploit when developing your
applications.
Android powers hundreds of millions of mobile devices in
more than 190 countries around the world. It's the largest
installed base of any mobile platform and is growing fast.
Every day another million user’s power up their Android
devices for the first time and start looking for apps, games,
and other digital content Android gives you everything you
need to build best-in-class app experiences. It gives you a
single application model that lets you deploy your apps
broadly to hundreds of millions of users across a wide range of
devices from phones to tablets and beyond.
People with mobile phones tend to get very irritated when
those phones do not work. Similarly, those same people will
get irritated if your program “breaks” their phones by
1. Tying up the CPU such that calls can’t be received.
2. Not quietly fading into the background when a call comes
in or needs to be placed, because the program doesn’t work
properly with the rest of the phone’s operating system.
3. Crashing the phone’s operating system, such as by leaking
memory like a sieve.
As with increase in popularity of this platform it has become
attractive target for the hackers. Attackers have shifted their
interest to this platform because it not only gives access to
victim’s files and personal details but also gives information
regarding victim’s location. Attackers can intercept victim’s
phone calls and messages.
The purpose of undertaking this project is to understand the
android framework and the framework’s weakness and what
type of attack could be done on this platform and also to
secure it by proposing feasible and proper patches for the
corresponding attacks thus making the system more secure
and safe to use. Also this project could help the security
organizations to identify the irrational activities and could take
appropriate efforts to avoid them.
2. PROPOSED SYSTEM
As most of the spyware uses different types of command and
control servers which can be easily traceable will be using the
twitter as our command and control and also use public
service like pastebin.com to upload file and response to
command.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 617
The features of android malware application can be briefly
summarized as follows:
2.1 Command and Control Centre (C&C)
Once the mobile device is infected with the malware the next
thing we are looking for is to control the device which is done
from a control centre which uses a channel to communicate to
the infected system. In this design twitter is used as channel
for communication. Attacker will use a web based command
panel which will tweet command using attackers twitter
account, this will be the command to be executed on
compromised phone on the other end i.e. infected phone will
read the tweet from the attacker and follow the order. Tweet
may include the configuration command which changes the
configuration of the malware like replaying channel. The
infected phone will communicate back using other twitter
account, so both attacker and compromised phone are using
different twitter account. All infected devices will be using
same twitter account.
We will be using the Hash tag to send the commands from the
web interface. The hash tag will be dynamically generated by
our own algorithm for every single day.The algorithm consists
of a string array which has the code for the numbers from one
to ten.
hashGeneratingStr[]={"ps","dk","rn","dh","kw","su","ql","ox"
,"zr"};
Fig 1: Block diagram of android malware
So the hash tag will be generated as follows:
If today date is (01 – 03 – 2014)
0 ps
1 dk
0 ps
3 dh
2 rn
0 ps
1 dk
4 kw
Then the hash will be #psdkpsdhrnpsdkkw.
The command generated by web interface will include the
hash tag along with the attack command to perform a specific
attack on the victim phone.
Sample Command generated by the web interface
#psdkpsdhrnpsdkkw sms-relay <attackers phone no>
<victimsphone no>.
The following command consist of the hash tag as well as the
attack name that is the sms relaying attack along with other
attributes of the sms relaying attack. The following command
will be twitted on the twitter account using the hash tag
generated by the algorithm. Also the result file or snapshot
will be twitted by the malware using the same algorithm. If the
file is big in size it will be uploaded on pastebin.com.
2.2 Application Phishing
After receiving the attack command from the twitter command
and control the malware will scan the foreground activity to
see which application is running. After scanning the malware
will use the phished application to activity to get the victims
credentials and will upload it to the pastebin.com.
2.3 SMS Relaying
Attacker will send SMS to infected phone which will be
relayed to other phone number, when the phone number will
reply to compromised phone it will reply to the attacker this
way attacker will remain stealth.
2.4 Stealing WhatsApp Chat:
After receiving the command from the attacker the malware in
the device firstly gets the external storage rights to access the
external storage. After getting the rights the malware access
the Whatsapp message database stored in the external storage
of the device. After accessing the database the malware then
attaches the database file to the mail via a attach mail
command and then sends it to the attacker via mail or it can
simply upload it to the pastebin.com. The command and center
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 618
will give the URL of the database to the attacker. The attacker
can then decrypt the database file and see the content in it.
3. CONCLUSIONS
The Android OS can be improved further for: To use the same
feature in an authenticated manner so this can be used for
surveillance against perpetrator, thus preventing it to fall under
wrong hands or person with malicious intent.
This system can also be used to monitor the phone to prevent
it to install cracked or pirated software thus preventing the
piracy. User must be informed properly why particular
permission is used (Android have a security permission
model), proper justification has to be provided that why
software needs to use certain feature of mobile device like for
example why does it require phones GPS location.
REFERENCES
[1]. Mark Murphy and Apress, “Beginning android 3”.
[2]. Wei Meng Lee and Wrox, “Beginning Android tablet
Application Development”.
[3]. James Steele and Nelson,”The android developer’s
cookbook”
[4]. Md. Ashraful Alam Milton and Ainul Anam Shahjamal
Khan, “Web Based Remote Exploration and Control System
Using Android Mobile Phone”, IEEE/OSAIIAPR
International Conference on Informatics, Electronics &
Vision.
[5]. Earlence Fernandes and Bruno Crispo, “FM 99.9, Radio
Virus: Exploiting FM Radio Broadcasts for Malware
Deployment”, IEEE TRANSACTIONS ON INFORMATION
FORENSICS AND SECURITY, VOL. 8, NO. 6, JUNE 2013.
[6]. Dino A. Dai Zovi and Alexander Sotirov,” Mobile Attacks
and Defense”
[7]. Marius Cristea and Bogdan Groza, “Fingerprinting
Smartphones Remotely via ICMP Timestamps”, IEEE
COMMUNICATIONS LETTERS, VOL. 17, NO. 6, JUNE
2013.
[8]. http://c0defreak.blogspot.in/2014/02/android-malware-
detecting-emulator.html.
BIOGRAPHIES
Name: Mr. Mohammed Tarwala
Designation: Student
Department: Computer Engineering
Qualifications: B.E (comp)Pursuing
Name: Mr.Munwar Hussain Shelia
Designation: Student
Department: Computer Engineering
Qualifications: B.E (Comp)Pursuing
Name: Mr.Nazmuddin Mavliwala
Designation: Student
Department: Computer Engineering
Qualifications: B.E (Comp)Pursuing
Name: Mrs. Shabana Tadvi
Designation: Assistant Professor
Department: Computer Engineering
Qualifications: B. E. (Comp.) M. E. (Comp.),
PhD. (Pursuing)

More Related Content

PDF
What is a Mobile Threat?
PPTX
What’s in your computer
PDF
Malicious android-applications-risks-exploitation 33578
PPSX
Hacker !
PDF
Avar2011 changing security_awareness_training
PDF
Domain 5 of the CEH: Web Application Hacking
PDF
Cybercrimes against the korean online banking systems 1227 eng_slideshare
PDF
Domain 4 of CEH V11: Network and Perimeter Hacking
What is a Mobile Threat?
What’s in your computer
Malicious android-applications-risks-exploitation 33578
Hacker !
Avar2011 changing security_awareness_training
Domain 5 of the CEH: Web Application Hacking
Cybercrimes against the korean online banking systems 1227 eng_slideshare
Domain 4 of CEH V11: Network and Perimeter Hacking

What's hot (19)

PPTX
Communication security 2021
PPTX
Hacking
PPTX
Computer security and ethics
DOCX
Hacker word that describes person who have special skills in the field of com...
PPTX
Ransomware attacks reveton
PPTX
Cyber Security Seminar Day 2
PPSX
Hacker !
PPTX
Hackers 22
PPTX
Cyber Attacks
DOCX
Pegasus
PPTX
Introduction To Ethical Hacking
PDF
Lookout pegasus-android-technical-analysis
PDF
Anatomy of a cyber-attack
PPT
Hacking
PPTX
Cyber warfare
PPTX
The trojan horse virus
PPTX
Internet Security in Web 2.0
PDF
UNDERSTANDING HACKING
Communication security 2021
Hacking
Computer security and ethics
Hacker word that describes person who have special skills in the field of com...
Ransomware attacks reveton
Cyber Security Seminar Day 2
Hacker !
Hackers 22
Cyber Attacks
Pegasus
Introduction To Ethical Hacking
Lookout pegasus-android-technical-analysis
Anatomy of a cyber-attack
Hacking
Cyber warfare
The trojan horse virus
Internet Security in Web 2.0
UNDERSTANDING HACKING
Ad

Viewers also liked (19)

PDF
Co channel deployment cross layer approach for lte heterogeneous networks
PDF
Aero design analysis for modified darrieus based-straight bladed vawt systems
PDF
An overview of methods for monitoring web services based on the quality of se...
PDF
Scalable recommendation with social contextual information
PDF
Clustering of medline documents using semi supervised spectral clustering
PDF
Assessment of industrial byproducts as permeable reactive barriers for landfi...
PDF
An mysterious location based efficient routing protocol in manets
PDF
Advanced control systems in two wheeler and finding the collision site of the...
PDF
Wear and corrosion studies on ferritic stainless steel (ss 409 m)
PDF
Solvent free synthesis of malonyl chlorides a green chemistry approach
PDF
Scalable recommendation with social contextual information
PDF
A change of profile based on location
PDF
Chebyshev filter applied to an inversion technique for breast tumour detection
PDF
Breakdown of tractor parts in ghana the case of ghana heavy equipment limited...
PDF
Quality – cost trade off (qct) for contractor selection
PDF
A parametric study of x and v bracing industrial steel structure
PDF
Secured architecture for multi cloud using key aggregation technique
PDF
Vehicle pollution control and traffic management
PDF
To study the behaviour of nanorefrigerant in vapour compression cycle a review
Co channel deployment cross layer approach for lte heterogeneous networks
Aero design analysis for modified darrieus based-straight bladed vawt systems
An overview of methods for monitoring web services based on the quality of se...
Scalable recommendation with social contextual information
Clustering of medline documents using semi supervised spectral clustering
Assessment of industrial byproducts as permeable reactive barriers for landfi...
An mysterious location based efficient routing protocol in manets
Advanced control systems in two wheeler and finding the collision site of the...
Wear and corrosion studies on ferritic stainless steel (ss 409 m)
Solvent free synthesis of malonyl chlorides a green chemistry approach
Scalable recommendation with social contextual information
A change of profile based on location
Chebyshev filter applied to an inversion technique for breast tumour detection
Breakdown of tractor parts in ghana the case of ghana heavy equipment limited...
Quality – cost trade off (qct) for contractor selection
A parametric study of x and v bracing industrial steel structure
Secured architecture for multi cloud using key aggregation technique
Vehicle pollution control and traffic management
To study the behaviour of nanorefrigerant in vapour compression cycle a review
Ad

Similar to Android malware (20)

DOCX
Report of android hacking
PDF
Irjet v7 i3811
PDF
The good, the bad, and the ugly on integration ai with cybersecurity
PDF
Smartphone Remote Detection and Wipe System using SMS
PDF
Malware Bytes – Advanced Fault Analysis
PDF
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
PDF
Android security
PDF
Android security
PDF
IRJET - System to Identify and Define Security Threats to the users About The...
DOCX
HinDroid
PDF
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
PDF
OS-Project-Report-Team-8
PDF
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
PDF
Permission based malware detection by using k means algorithm in Android OS
PDF
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
PDF
Detect and immune mobile cloud infrastructure
PDF
Comparative Study on Intrusion Detection Systems for Smartphones
PDF
A017360104
PDF
Attribute-based Permission Model for Android Smartphones
PDF
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
Report of android hacking
Irjet v7 i3811
The good, the bad, and the ugly on integration ai with cybersecurity
Smartphone Remote Detection and Wipe System using SMS
Malware Bytes – Advanced Fault Analysis
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Android security
Android security
IRJET - System to Identify and Define Security Threats to the users About The...
HinDroid
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
OS-Project-Report-Team-8
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Permission based malware detection by using k means algorithm in Android OS
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Detect and immune mobile cloud infrastructure
Comparative Study on Intrusion Detection Systems for Smartphones
A017360104
Attribute-based Permission Model for Android Smartphones
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...

More from eSAT Journals (20)

PDF
Mechanical properties of hybrid fiber reinforced concrete for pavements
PDF
Material management in construction – a case study
PDF
Managing drought short term strategies in semi arid regions a case study
PDF
Life cycle cost analysis of overlay for an urban road in bangalore
PDF
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
PDF
Laboratory investigation of expansive soil stabilized with natural inorganic ...
PDF
Influence of reinforcement on the behavior of hollow concrete block masonry p...
PDF
Influence of compaction energy on soil stabilized with chemical stabilizer
PDF
Geographical information system (gis) for water resources management
PDF
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
PDF
Factors influencing compressive strength of geopolymer concrete
PDF
Experimental investigation on circular hollow steel columns in filled with li...
PDF
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
PDF
Evaluation of punching shear in flat slabs
PDF
Evaluation of performance of intake tower dam for recent earthquake in india
PDF
Evaluation of operational efficiency of urban road network using travel time ...
PDF
Estimation of surface runoff in nallur amanikere watershed using scs cn method
PDF
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
PDF
Effect of variation of plastic hinge length on the results of non linear anal...
PDF
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Mechanical properties of hybrid fiber reinforced concrete for pavements
Material management in construction – a case study
Managing drought short term strategies in semi arid regions a case study
Life cycle cost analysis of overlay for an urban road in bangalore
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of compaction energy on soil stabilized with chemical stabilizer
Geographical information system (gis) for water resources management
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Factors influencing compressive strength of geopolymer concrete
Experimental investigation on circular hollow steel columns in filled with li...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Evaluation of punching shear in flat slabs
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of operational efficiency of urban road network using travel time ...
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of use of recycled materials on indirect tensile strength of asphalt c...

Recently uploaded (20)

PPTX
Measurement Uncertainty and Measurement System analysis
PDF
Applications of Equal_Area_Criterion.pdf
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PPT
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
PDF
Cryptography and Network Security-Module-I.pdf
PPTX
Petroleum Refining & Petrochemicals.pptx
PDF
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
mechattonicsand iotwith sensor and actuator
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PDF
Java Basics-Introduction and program control
PPTX
Feature types and data preprocessing steps
PPTX
Principal presentation for NAAC (1).pptx
PPTX
PRASUNET_20240614003_231416_0000[1].pptx
PPTX
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
PDF
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
PDF
First part_B-Image Processing - 1 of 2).pdf
PPTX
Information Storage and Retrieval Techniques Unit III
Measurement Uncertainty and Measurement System analysis
Applications of Equal_Area_Criterion.pdf
Soil Improvement Techniques Note - Rabbi
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
Cryptography and Network Security-Module-I.pdf
Petroleum Refining & Petrochemicals.pptx
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
Exploratory_Data_Analysis_Fundamentals.pdf
mechattonicsand iotwith sensor and actuator
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
20250617 - IR - Global Guide for HR - 51 pages.pdf
Java Basics-Introduction and program control
Feature types and data preprocessing steps
Principal presentation for NAAC (1).pptx
PRASUNET_20240614003_231416_0000[1].pptx
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
First part_B-Image Processing - 1 of 2).pdf
Information Storage and Retrieval Techniques Unit III

Android malware

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 616 ANDROID MALWARE Mohammed Tarwala1 , Munwar Hussain Shelia2 , Nazmuddin Mavliwala3 , Shabana Tadvi4 1 Student, Computer Engineering, MHSSCOE, Maharashtra, India 2 Student, Computer Engineering, MHSSCOE, Maharashtra, India 3 Student, Computer Engineering, MHSSCOE, Maharashtra, India 4 Assistance Professor, Computer Engineering, MHSSCOE, Maharashtra, India Abstract Now a day’s android devices are so common that they are used by everyone in the world. But with the commonness of the android OS and Android based devices there comes a threat to these android devices. This paper will implement some of the threats to the Android device and will also present their counter measures. First of all it will implement trivial malware attack on android device and android OS like message stealing and contact stealing, files stealing from SD card and also their solutions to prevent it. Secondly this project will perform more sophisticated attacks like whatsapp message stealing, using twitter as command and control in android devices and using Web Based Remote Exploration and Control System, denial of convenience attacks using fake access point, phishing attacks. Keywords: Android Malware, Mobile Malware, Flaws in android Security Model, Web based exploitation, Application phishing in android. ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Android is everywhere Phones Tablets. TVs and set-top boxes powered by Google TV. Soon, Android will be in cars and all sort of other places as well. However, the general theme of Android devices will be smaller screens and/or no hardware keyboard. And, by the numbers, Android will probably be associated mostly with smart phones for the foreseeable future. For developers, this has both benefits and drawbacks, as described next. This chapter also describes the main components in an Android application and the Android features that you can exploit when developing your applications. Android powers hundreds of millions of mobile devices in more than 190 countries around the world. It's the largest installed base of any mobile platform and is growing fast. Every day another million user’s power up their Android devices for the first time and start looking for apps, games, and other digital content Android gives you everything you need to build best-in-class app experiences. It gives you a single application model that lets you deploy your apps broadly to hundreds of millions of users across a wide range of devices from phones to tablets and beyond. People with mobile phones tend to get very irritated when those phones do not work. Similarly, those same people will get irritated if your program “breaks” their phones by 1. Tying up the CPU such that calls can’t be received. 2. Not quietly fading into the background when a call comes in or needs to be placed, because the program doesn’t work properly with the rest of the phone’s operating system. 3. Crashing the phone’s operating system, such as by leaking memory like a sieve. As with increase in popularity of this platform it has become attractive target for the hackers. Attackers have shifted their interest to this platform because it not only gives access to victim’s files and personal details but also gives information regarding victim’s location. Attackers can intercept victim’s phone calls and messages. The purpose of undertaking this project is to understand the android framework and the framework’s weakness and what type of attack could be done on this platform and also to secure it by proposing feasible and proper patches for the corresponding attacks thus making the system more secure and safe to use. Also this project could help the security organizations to identify the irrational activities and could take appropriate efforts to avoid them. 2. PROPOSED SYSTEM As most of the spyware uses different types of command and control servers which can be easily traceable will be using the twitter as our command and control and also use public service like pastebin.com to upload file and response to command.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 617 The features of android malware application can be briefly summarized as follows: 2.1 Command and Control Centre (C&C) Once the mobile device is infected with the malware the next thing we are looking for is to control the device which is done from a control centre which uses a channel to communicate to the infected system. In this design twitter is used as channel for communication. Attacker will use a web based command panel which will tweet command using attackers twitter account, this will be the command to be executed on compromised phone on the other end i.e. infected phone will read the tweet from the attacker and follow the order. Tweet may include the configuration command which changes the configuration of the malware like replaying channel. The infected phone will communicate back using other twitter account, so both attacker and compromised phone are using different twitter account. All infected devices will be using same twitter account. We will be using the Hash tag to send the commands from the web interface. The hash tag will be dynamically generated by our own algorithm for every single day.The algorithm consists of a string array which has the code for the numbers from one to ten. hashGeneratingStr[]={"ps","dk","rn","dh","kw","su","ql","ox" ,"zr"}; Fig 1: Block diagram of android malware So the hash tag will be generated as follows: If today date is (01 – 03 – 2014) 0 ps 1 dk 0 ps 3 dh 2 rn 0 ps 1 dk 4 kw Then the hash will be #psdkpsdhrnpsdkkw. The command generated by web interface will include the hash tag along with the attack command to perform a specific attack on the victim phone. Sample Command generated by the web interface #psdkpsdhrnpsdkkw sms-relay <attackers phone no> <victimsphone no>. The following command consist of the hash tag as well as the attack name that is the sms relaying attack along with other attributes of the sms relaying attack. The following command will be twitted on the twitter account using the hash tag generated by the algorithm. Also the result file or snapshot will be twitted by the malware using the same algorithm. If the file is big in size it will be uploaded on pastebin.com. 2.2 Application Phishing After receiving the attack command from the twitter command and control the malware will scan the foreground activity to see which application is running. After scanning the malware will use the phished application to activity to get the victims credentials and will upload it to the pastebin.com. 2.3 SMS Relaying Attacker will send SMS to infected phone which will be relayed to other phone number, when the phone number will reply to compromised phone it will reply to the attacker this way attacker will remain stealth. 2.4 Stealing WhatsApp Chat: After receiving the command from the attacker the malware in the device firstly gets the external storage rights to access the external storage. After getting the rights the malware access the Whatsapp message database stored in the external storage of the device. After accessing the database the malware then attaches the database file to the mail via a attach mail command and then sends it to the attacker via mail or it can simply upload it to the pastebin.com. The command and center
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 618 will give the URL of the database to the attacker. The attacker can then decrypt the database file and see the content in it. 3. CONCLUSIONS The Android OS can be improved further for: To use the same feature in an authenticated manner so this can be used for surveillance against perpetrator, thus preventing it to fall under wrong hands or person with malicious intent. This system can also be used to monitor the phone to prevent it to install cracked or pirated software thus preventing the piracy. User must be informed properly why particular permission is used (Android have a security permission model), proper justification has to be provided that why software needs to use certain feature of mobile device like for example why does it require phones GPS location. REFERENCES [1]. Mark Murphy and Apress, “Beginning android 3”. [2]. Wei Meng Lee and Wrox, “Beginning Android tablet Application Development”. [3]. James Steele and Nelson,”The android developer’s cookbook” [4]. Md. Ashraful Alam Milton and Ainul Anam Shahjamal Khan, “Web Based Remote Exploration and Control System Using Android Mobile Phone”, IEEE/OSAIIAPR International Conference on Informatics, Electronics & Vision. [5]. Earlence Fernandes and Bruno Crispo, “FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 6, JUNE 2013. [6]. Dino A. Dai Zovi and Alexander Sotirov,” Mobile Attacks and Defense” [7]. Marius Cristea and Bogdan Groza, “Fingerprinting Smartphones Remotely via ICMP Timestamps”, IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 6, JUNE 2013. [8]. http://c0defreak.blogspot.in/2014/02/android-malware- detecting-emulator.html. BIOGRAPHIES Name: Mr. Mohammed Tarwala Designation: Student Department: Computer Engineering Qualifications: B.E (comp)Pursuing Name: Mr.Munwar Hussain Shelia Designation: Student Department: Computer Engineering Qualifications: B.E (Comp)Pursuing Name: Mr.Nazmuddin Mavliwala Designation: Student Department: Computer Engineering Qualifications: B.E (Comp)Pursuing Name: Mrs. Shabana Tadvi Designation: Assistant Professor Department: Computer Engineering Qualifications: B. E. (Comp.) M. E. (Comp.), PhD. (Pursuing)