As per discoveries of competent security software two new Android malware is on the hunt to ‘discreetly’ access control of the victim’s account so as to send different ill-intentioned content. The two malware together steal cookies collected by the browser as well as applications of famous social networking sites and accordingly making things easier for the thieves to do their job.
While cookies are frequently perceived as quite harmless since they are characterized as small bits of data collected by websites to smoothly track user activity online with an end goal to create customized settings for them in the future however in a wring hands, they represent a serious security hazard.
A grave security risk since, when websites store these cookies, they utilize a unique session ID that recognizes the user later on without having them to enter a password or login again.
Once possessing a user’s ID, swindlers can trick the websites into assuming that they are in fact the person in question and thusly take control of the latter’s account. What’s more, that is actually what these cookie thieves did, as described by computer security software major Kaspersky, creating Trojans with comparable coding constrained by a similar command and control (C&C) server.
The primary Trojan obtains root rights on the victim’s device, which permits the thieves to transfer Facebook’s cookies to their own servers. Be that as it may, in many cases, just having the ID number isn’t sufficient to assume control for another’s account. A few sites have safety measures set up that forestalls suspicious log-in endeavors as well.
Here is when the second Trojan comes in. This malignant application can run a proxy server on a victim’s device to sidestep the security measures, obtaining access without raising any doubt. From that point onwards, the thieves can act as the ‘person in question’ and assume control for their social media accounts to circulate undesirable content.
While a definitive aim of the cookie thieves remains rather obscure, a page revealed on the same C&C server could provide a clue: the page promotes services for distributing spam on social networks and messengers.
In simpler words, the thieves might be looking for account access as an approach to dispatch widespread spam and phishing attacks.
Malware analyst Igor Golovin says “By combining two attacks, the cookie thieves have discovered a way to gain control over their victims` account without arising suspicions. While this is a relatively new threat — so far, only about 1,000 individuals have been targeted — that number is growing and will most likely continue to do so, particularly since it`s so hard for websites to detect.”
He adds later “Even though we typically don`t pay attention to cookies when we`re surfing the web, they`re still another means of processing our personal information, and anytime data about us is collected online, we need to pay attention.”
According to Kaspersky experts all hope’s isn’t lost they made certain recommendations which might help a user to save themselves from becoming a victim of cookie theft : –
- Block third-party cookie access on your phone`s web browser and only let your data be saved until you quit the browser
- Periodically clear your cookies
- Use a reliable security solution that includes a private browsing feature, which prevents websites from collecting information about your activity online.