SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 616
ANDROID MALWARE
Mohammed Tarwala1
, Munwar Hussain Shelia2
, Nazmuddin Mavliwala3
, Shabana Tadvi4
1
Student, Computer Engineering, MHSSCOE, Maharashtra, India
2
Student, Computer Engineering, MHSSCOE, Maharashtra, India
3
Student, Computer Engineering, MHSSCOE, Maharashtra, India
4
Assistance Professor, Computer Engineering, MHSSCOE, Maharashtra, India
Abstract
Now a day’s android devices are so common that they are used by everyone in the world. But with the commonness of the android OS
and Android based devices there comes a threat to these android devices. This paper will implement some of the threats to the
Android device and will also present their counter measures. First of all it will implement trivial malware attack on android device
and android OS like message stealing and contact stealing, files stealing from SD card and also their solutions to prevent it. Secondly
this project will perform more sophisticated attacks like whatsapp message stealing, using twitter as command and control in android
devices and using Web Based Remote Exploration and Control System, denial of convenience attacks using fake access point, phishing
attacks.
Keywords: Android Malware, Mobile Malware, Flaws in android Security Model, Web based exploitation, Application
phishing in android.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Android is everywhere Phones Tablets. TVs and set-top boxes
powered by Google TV. Soon, Android will be in cars and all
sort of other places as well. However, the general theme of
Android devices will be smaller screens and/or no hardware
keyboard. And, by the numbers, Android will probably be
associated mostly with smart phones for the foreseeable
future. For developers, this has both benefits and drawbacks,
as described next. This chapter also describes the main
components in an Android application and the Android
features that you can exploit when developing your
applications.
Android powers hundreds of millions of mobile devices in
more than 190 countries around the world. It's the largest
installed base of any mobile platform and is growing fast.
Every day another million user’s power up their Android
devices for the first time and start looking for apps, games,
and other digital content Android gives you everything you
need to build best-in-class app experiences. It gives you a
single application model that lets you deploy your apps
broadly to hundreds of millions of users across a wide range of
devices from phones to tablets and beyond.
People with mobile phones tend to get very irritated when
those phones do not work. Similarly, those same people will
get irritated if your program “breaks” their phones by
1. Tying up the CPU such that calls can’t be received.
2. Not quietly fading into the background when a call comes
in or needs to be placed, because the program doesn’t work
properly with the rest of the phone’s operating system.
3. Crashing the phone’s operating system, such as by leaking
memory like a sieve.
As with increase in popularity of this platform it has become
attractive target for the hackers. Attackers have shifted their
interest to this platform because it not only gives access to
victim’s files and personal details but also gives information
regarding victim’s location. Attackers can intercept victim’s
phone calls and messages.
The purpose of undertaking this project is to understand the
android framework and the framework’s weakness and what
type of attack could be done on this platform and also to
secure it by proposing feasible and proper patches for the
corresponding attacks thus making the system more secure
and safe to use. Also this project could help the security
organizations to identify the irrational activities and could take
appropriate efforts to avoid them.
2. PROPOSED SYSTEM
As most of the spyware uses different types of command and
control servers which can be easily traceable will be using the
twitter as our command and control and also use public
service like pastebin.com to upload file and response to
command.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 617
The features of android malware application can be briefly
summarized as follows:
2.1 Command and Control Centre (C&C)
Once the mobile device is infected with the malware the next
thing we are looking for is to control the device which is done
from a control centre which uses a channel to communicate to
the infected system. In this design twitter is used as channel
for communication. Attacker will use a web based command
panel which will tweet command using attackers twitter
account, this will be the command to be executed on
compromised phone on the other end i.e. infected phone will
read the tweet from the attacker and follow the order. Tweet
may include the configuration command which changes the
configuration of the malware like replaying channel. The
infected phone will communicate back using other twitter
account, so both attacker and compromised phone are using
different twitter account. All infected devices will be using
same twitter account.
We will be using the Hash tag to send the commands from the
web interface. The hash tag will be dynamically generated by
our own algorithm for every single day.The algorithm consists
of a string array which has the code for the numbers from one
to ten.
hashGeneratingStr[]={"ps","dk","rn","dh","kw","su","ql","ox"
,"zr"};
Fig 1: Block diagram of android malware
So the hash tag will be generated as follows:
If today date is (01 – 03 – 2014)
0 ps
1 dk
0 ps
3 dh
2 rn
0 ps
1 dk
4 kw
Then the hash will be #psdkpsdhrnpsdkkw.
The command generated by web interface will include the
hash tag along with the attack command to perform a specific
attack on the victim phone.
Sample Command generated by the web interface
#psdkpsdhrnpsdkkw sms-relay <attackers phone no>
<victimsphone no>.
The following command consist of the hash tag as well as the
attack name that is the sms relaying attack along with other
attributes of the sms relaying attack. The following command
will be twitted on the twitter account using the hash tag
generated by the algorithm. Also the result file or snapshot
will be twitted by the malware using the same algorithm. If the
file is big in size it will be uploaded on pastebin.com.
2.2 Application Phishing
After receiving the attack command from the twitter command
and control the malware will scan the foreground activity to
see which application is running. After scanning the malware
will use the phished application to activity to get the victims
credentials and will upload it to the pastebin.com.
2.3 SMS Relaying
Attacker will send SMS to infected phone which will be
relayed to other phone number, when the phone number will
reply to compromised phone it will reply to the attacker this
way attacker will remain stealth.
2.4 Stealing WhatsApp Chat:
After receiving the command from the attacker the malware in
the device firstly gets the external storage rights to access the
external storage. After getting the rights the malware access
the Whatsapp message database stored in the external storage
of the device. After accessing the database the malware then
attaches the database file to the mail via a attach mail
command and then sends it to the attacker via mail or it can
simply upload it to the pastebin.com. The command and center
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 618
will give the URL of the database to the attacker. The attacker
can then decrypt the database file and see the content in it.
3. CONCLUSIONS
The Android OS can be improved further for: To use the same
feature in an authenticated manner so this can be used for
surveillance against perpetrator, thus preventing it to fall under
wrong hands or person with malicious intent.
This system can also be used to monitor the phone to prevent
it to install cracked or pirated software thus preventing the
piracy. User must be informed properly why particular
permission is used (Android have a security permission
model), proper justification has to be provided that why
software needs to use certain feature of mobile device like for
example why does it require phones GPS location.
REFERENCES
[1]. Mark Murphy and Apress, “Beginning android 3”.
[2]. Wei Meng Lee and Wrox, “Beginning Android tablet
Application Development”.
[3]. James Steele and Nelson,”The android developer’s
cookbook”
[4]. Md. Ashraful Alam Milton and Ainul Anam Shahjamal
Khan, “Web Based Remote Exploration and Control System
Using Android Mobile Phone”, IEEE/OSAIIAPR
International Conference on Informatics, Electronics &
Vision.
[5]. Earlence Fernandes and Bruno Crispo, “FM 99.9, Radio
Virus: Exploiting FM Radio Broadcasts for Malware
Deployment”, IEEE TRANSACTIONS ON INFORMATION
FORENSICS AND SECURITY, VOL. 8, NO. 6, JUNE 2013.
[6]. Dino A. Dai Zovi and Alexander Sotirov,” Mobile Attacks
and Defense”
[7]. Marius Cristea and Bogdan Groza, “Fingerprinting
Smartphones Remotely via ICMP Timestamps”, IEEE
COMMUNICATIONS LETTERS, VOL. 17, NO. 6, JUNE
2013.
[8]. http://c0defreak.blogspot.in/2014/02/android-malware-
detecting-emulator.html.
BIOGRAPHIES
Name: Mr. Mohammed Tarwala
Designation: Student
Department: Computer Engineering
Qualifications: B.E (comp)Pursuing
Name: Mr.Munwar Hussain Shelia
Designation: Student
Department: Computer Engineering
Qualifications: B.E (Comp)Pursuing
Name: Mr.Nazmuddin Mavliwala
Designation: Student
Department: Computer Engineering
Qualifications: B.E (Comp)Pursuing
Name: Mrs. Shabana Tadvi
Designation: Assistant Professor
Department: Computer Engineering
Qualifications: B. E. (Comp.) M. E. (Comp.),
PhD. (Pursuing)

More Related Content

PDF
What is a Mobile Threat?
PPTX
What’s in your computer
PDF
Malicious android-applications-risks-exploitation 33578
PPSX
Hacker !
PDF
Avar2011 changing security_awareness_training
PDF
Domain 5 of the CEH: Web Application Hacking
PDF
Cybercrimes against the korean online banking systems 1227 eng_slideshare
PDF
Domain 4 of CEH V11: Network and Perimeter Hacking
What is a Mobile Threat?
What’s in your computer
Malicious android-applications-risks-exploitation 33578
Hacker !
Avar2011 changing security_awareness_training
Domain 5 of the CEH: Web Application Hacking
Cybercrimes against the korean online banking systems 1227 eng_slideshare
Domain 4 of CEH V11: Network and Perimeter Hacking

What's hot (19)

PPTX
Communication security 2021
PPTX
Hacking
PPTX
Computer security and ethics
DOCX
Hacker word that describes person who have special skills in the field of com...
PPTX
Ransomware attacks reveton
PPTX
Cyber Security Seminar Day 2
PPSX
Hacker !
PPTX
Hackers 22
PPTX
Cyber Attacks
DOCX
Pegasus
PPTX
Introduction To Ethical Hacking
PDF
Lookout pegasus-android-technical-analysis
PDF
Anatomy of a cyber-attack
PPT
Hacking
PPTX
Cyber warfare
PPTX
The trojan horse virus
PPTX
Internet Security in Web 2.0
PDF
UNDERSTANDING HACKING
Communication security 2021
Hacking
Computer security and ethics
Hacker word that describes person who have special skills in the field of com...
Ransomware attacks reveton
Cyber Security Seminar Day 2
Hacker !
Hackers 22
Cyber Attacks
Pegasus
Introduction To Ethical Hacking
Lookout pegasus-android-technical-analysis
Anatomy of a cyber-attack
Hacking
Cyber warfare
The trojan horse virus
Internet Security in Web 2.0
UNDERSTANDING HACKING
Ad

Viewers also liked (20)

PDF
Next generation engine immobiliser
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Investigation and computational analysis of divergent orifice in fuel injecto...
PDF
A comparative study of physical attacks on wireless sensor networks
PDF
Exposure hazard analysis in cement fiber sheet
PDF
Intelligent computing techniques on medical image segmentation and analysis a...
PDF
Investigation of behaviour of 3 degrees of freedom
PDF
Cyclone disaster on housing and coastal area
PDF
Integrated grid inverter with frequency control scheme for wind mill applicat...
PDF
Cost effective failover clustering
PDF
Design and development of load sharing multipath routing protcol for mobile a...
PDF
Test case prioritization using hyperlink rankinga
PDF
Synthesis, characterisation and antibacterial activity of copolymer (n vinylp...
PDF
Authorization mechanism for multiparty data sharing in social network
PDF
Review on an object following wireless robot
PDF
Removal of chromium (vi) by activated carbon derived from mangifera indica
PDF
Accelerated seam carving using cuda
PDF
Video inpainting using backgroung registration
PDF
Dead node detection in teen protocol survey
PDF
Predicting construction project duration with support
Next generation engine immobiliser
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Investigation and computational analysis of divergent orifice in fuel injecto...
A comparative study of physical attacks on wireless sensor networks
Exposure hazard analysis in cement fiber sheet
Intelligent computing techniques on medical image segmentation and analysis a...
Investigation of behaviour of 3 degrees of freedom
Cyclone disaster on housing and coastal area
Integrated grid inverter with frequency control scheme for wind mill applicat...
Cost effective failover clustering
Design and development of load sharing multipath routing protcol for mobile a...
Test case prioritization using hyperlink rankinga
Synthesis, characterisation and antibacterial activity of copolymer (n vinylp...
Authorization mechanism for multiparty data sharing in social network
Review on an object following wireless robot
Removal of chromium (vi) by activated carbon derived from mangifera indica
Accelerated seam carving using cuda
Video inpainting using backgroung registration
Dead node detection in teen protocol survey
Predicting construction project duration with support
Ad

Similar to Android malware (20)

DOCX
Report of android hacking
PDF
Irjet v7 i3811
PDF
The good, the bad, and the ugly on integration ai with cybersecurity
PDF
Smartphone Remote Detection and Wipe System using SMS
PDF
Malware Bytes – Advanced Fault Analysis
PDF
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
PDF
Android security
PDF
Android security
PDF
IRJET - System to Identify and Define Security Threats to the users About The...
DOCX
HinDroid
PDF
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
PDF
OS-Project-Report-Team-8
PDF
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
PDF
Permission based malware detection by using k means algorithm in Android OS
PDF
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
PDF
Detect and immune mobile cloud infrastructure
PDF
A017360104
PDF
Comparative Study on Intrusion Detection Systems for Smartphones
PDF
Attribute-based Permission Model for Android Smartphones
PDF
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
Report of android hacking
Irjet v7 i3811
The good, the bad, and the ugly on integration ai with cybersecurity
Smartphone Remote Detection and Wipe System using SMS
Malware Bytes – Advanced Fault Analysis
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Android security
Android security
IRJET - System to Identify and Define Security Threats to the users About The...
HinDroid
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
OS-Project-Report-Team-8
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Permission based malware detection by using k means algorithm in Android OS
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Detect and immune mobile cloud infrastructure
A017360104
Comparative Study on Intrusion Detection Systems for Smartphones
Attribute-based Permission Model for Android Smartphones
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Assessment of seismic susceptibility of rc buildings
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
PDF
Disaster recovery sustainable housing
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Low cost wireless sensor networks and smartphone applications for disaster ma...
Coastal zones – seismic vulnerability an analysis from east coast of india
Can fracture mechanics predict damage due disaster of structures
Assessment of seismic susceptibility of rc buildings
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Disaster recovery sustainable housing

Recently uploaded (20)

DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Digital Logic Computer Design lecture notes
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
additive manufacturing of ss316l using mig welding
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
CH1 Production IntroductoryConcepts.pptx
bas. eng. economics group 4 presentation 1.pptx
Digital Logic Computer Design lecture notes
Embodied AI: Ushering in the Next Era of Intelligent Systems
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
additive manufacturing of ss316l using mig welding
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Mechanical Engineering MATERIALS Selection
Lecture Notes Electrical Wiring System Components
UNIT-1 - COAL BASED THERMAL POWER PLANTS
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx

Android malware

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 616 ANDROID MALWARE Mohammed Tarwala1 , Munwar Hussain Shelia2 , Nazmuddin Mavliwala3 , Shabana Tadvi4 1 Student, Computer Engineering, MHSSCOE, Maharashtra, India 2 Student, Computer Engineering, MHSSCOE, Maharashtra, India 3 Student, Computer Engineering, MHSSCOE, Maharashtra, India 4 Assistance Professor, Computer Engineering, MHSSCOE, Maharashtra, India Abstract Now a day’s android devices are so common that they are used by everyone in the world. But with the commonness of the android OS and Android based devices there comes a threat to these android devices. This paper will implement some of the threats to the Android device and will also present their counter measures. First of all it will implement trivial malware attack on android device and android OS like message stealing and contact stealing, files stealing from SD card and also their solutions to prevent it. Secondly this project will perform more sophisticated attacks like whatsapp message stealing, using twitter as command and control in android devices and using Web Based Remote Exploration and Control System, denial of convenience attacks using fake access point, phishing attacks. Keywords: Android Malware, Mobile Malware, Flaws in android Security Model, Web based exploitation, Application phishing in android. ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Android is everywhere Phones Tablets. TVs and set-top boxes powered by Google TV. Soon, Android will be in cars and all sort of other places as well. However, the general theme of Android devices will be smaller screens and/or no hardware keyboard. And, by the numbers, Android will probably be associated mostly with smart phones for the foreseeable future. For developers, this has both benefits and drawbacks, as described next. This chapter also describes the main components in an Android application and the Android features that you can exploit when developing your applications. Android powers hundreds of millions of mobile devices in more than 190 countries around the world. It's the largest installed base of any mobile platform and is growing fast. Every day another million user’s power up their Android devices for the first time and start looking for apps, games, and other digital content Android gives you everything you need to build best-in-class app experiences. It gives you a single application model that lets you deploy your apps broadly to hundreds of millions of users across a wide range of devices from phones to tablets and beyond. People with mobile phones tend to get very irritated when those phones do not work. Similarly, those same people will get irritated if your program “breaks” their phones by 1. Tying up the CPU such that calls can’t be received. 2. Not quietly fading into the background when a call comes in or needs to be placed, because the program doesn’t work properly with the rest of the phone’s operating system. 3. Crashing the phone’s operating system, such as by leaking memory like a sieve. As with increase in popularity of this platform it has become attractive target for the hackers. Attackers have shifted their interest to this platform because it not only gives access to victim’s files and personal details but also gives information regarding victim’s location. Attackers can intercept victim’s phone calls and messages. The purpose of undertaking this project is to understand the android framework and the framework’s weakness and what type of attack could be done on this platform and also to secure it by proposing feasible and proper patches for the corresponding attacks thus making the system more secure and safe to use. Also this project could help the security organizations to identify the irrational activities and could take appropriate efforts to avoid them. 2. PROPOSED SYSTEM As most of the spyware uses different types of command and control servers which can be easily traceable will be using the twitter as our command and control and also use public service like pastebin.com to upload file and response to command.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 617 The features of android malware application can be briefly summarized as follows: 2.1 Command and Control Centre (C&C) Once the mobile device is infected with the malware the next thing we are looking for is to control the device which is done from a control centre which uses a channel to communicate to the infected system. In this design twitter is used as channel for communication. Attacker will use a web based command panel which will tweet command using attackers twitter account, this will be the command to be executed on compromised phone on the other end i.e. infected phone will read the tweet from the attacker and follow the order. Tweet may include the configuration command which changes the configuration of the malware like replaying channel. The infected phone will communicate back using other twitter account, so both attacker and compromised phone are using different twitter account. All infected devices will be using same twitter account. We will be using the Hash tag to send the commands from the web interface. The hash tag will be dynamically generated by our own algorithm for every single day.The algorithm consists of a string array which has the code for the numbers from one to ten. hashGeneratingStr[]={"ps","dk","rn","dh","kw","su","ql","ox" ,"zr"}; Fig 1: Block diagram of android malware So the hash tag will be generated as follows: If today date is (01 – 03 – 2014) 0 ps 1 dk 0 ps 3 dh 2 rn 0 ps 1 dk 4 kw Then the hash will be #psdkpsdhrnpsdkkw. The command generated by web interface will include the hash tag along with the attack command to perform a specific attack on the victim phone. Sample Command generated by the web interface #psdkpsdhrnpsdkkw sms-relay <attackers phone no> <victimsphone no>. The following command consist of the hash tag as well as the attack name that is the sms relaying attack along with other attributes of the sms relaying attack. The following command will be twitted on the twitter account using the hash tag generated by the algorithm. Also the result file or snapshot will be twitted by the malware using the same algorithm. If the file is big in size it will be uploaded on pastebin.com. 2.2 Application Phishing After receiving the attack command from the twitter command and control the malware will scan the foreground activity to see which application is running. After scanning the malware will use the phished application to activity to get the victims credentials and will upload it to the pastebin.com. 2.3 SMS Relaying Attacker will send SMS to infected phone which will be relayed to other phone number, when the phone number will reply to compromised phone it will reply to the attacker this way attacker will remain stealth. 2.4 Stealing WhatsApp Chat: After receiving the command from the attacker the malware in the device firstly gets the external storage rights to access the external storage. After getting the rights the malware access the Whatsapp message database stored in the external storage of the device. After accessing the database the malware then attaches the database file to the mail via a attach mail command and then sends it to the attacker via mail or it can simply upload it to the pastebin.com. The command and center
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 618 will give the URL of the database to the attacker. The attacker can then decrypt the database file and see the content in it. 3. CONCLUSIONS The Android OS can be improved further for: To use the same feature in an authenticated manner so this can be used for surveillance against perpetrator, thus preventing it to fall under wrong hands or person with malicious intent. This system can also be used to monitor the phone to prevent it to install cracked or pirated software thus preventing the piracy. User must be informed properly why particular permission is used (Android have a security permission model), proper justification has to be provided that why software needs to use certain feature of mobile device like for example why does it require phones GPS location. REFERENCES [1]. Mark Murphy and Apress, “Beginning android 3”. [2]. Wei Meng Lee and Wrox, “Beginning Android tablet Application Development”. [3]. James Steele and Nelson,”The android developer’s cookbook” [4]. Md. Ashraful Alam Milton and Ainul Anam Shahjamal Khan, “Web Based Remote Exploration and Control System Using Android Mobile Phone”, IEEE/OSAIIAPR International Conference on Informatics, Electronics & Vision. [5]. Earlence Fernandes and Bruno Crispo, “FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 6, JUNE 2013. [6]. Dino A. Dai Zovi and Alexander Sotirov,” Mobile Attacks and Defense” [7]. Marius Cristea and Bogdan Groza, “Fingerprinting Smartphones Remotely via ICMP Timestamps”, IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 6, JUNE 2013. [8]. http://c0defreak.blogspot.in/2014/02/android-malware- detecting-emulator.html. BIOGRAPHIES Name: Mr. Mohammed Tarwala Designation: Student Department: Computer Engineering Qualifications: B.E (comp)Pursuing Name: Mr.Munwar Hussain Shelia Designation: Student Department: Computer Engineering Qualifications: B.E (Comp)Pursuing Name: Mr.Nazmuddin Mavliwala Designation: Student Department: Computer Engineering Qualifications: B.E (Comp)Pursuing Name: Mrs. Shabana Tadvi Designation: Assistant Professor Department: Computer Engineering Qualifications: B. E. (Comp.) M. E. (Comp.), PhD. (Pursuing)