This article is from the source 'bbc' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at http://www.bbc.co.uk/news/technology-30143283

The article has changed 2 times. There is an RSS feed of changes available.

Version 0 Version 1
'Sophisticated' Android malware hits phones 'Sophisticated' Android malware hits phones
(about 1 hour later)
Hundreds of thousands of Android phones have been infected with malware that uses handsets to send spam and buy event tickets in bulk.Hundreds of thousands of Android phones have been infected with malware that uses handsets to send spam and buy event tickets in bulk.
Mobile security firm Lookout said the bug, called NotCompatible, was the most sophisticated it had seen. Mobile security firm Lookout said the virus, called NotCompatible, was the most sophisticated it had seen.
The cyberthieves behind the bug had recently rewritten its core code to make it harder to defeat, it said. The cyberthieves behind it had recently rewritten its core code to make it harder to defeat, it said.
Mobile malware aimed at smartphones is steadily getting more complex, said security company Wandera.Mobile malware aimed at smartphones is steadily getting more complex, said security company Wandera.
Jeremy Linden, a security analyst at Lookout, said: "The group behind NotCompatible are operating on a different plane to the typical mobile malware maker."Jeremy Linden, a security analyst at Lookout, said: "The group behind NotCompatible are operating on a different plane to the typical mobile malware maker."
Victims for rentVictims for rent
Usually, he said, mobile malware campaigns lasted only a couple of weeks but the NotCompatible creators had been operating for more than two years.Usually, he said, mobile malware campaigns lasted only a couple of weeks but the NotCompatible creators had been operating for more than two years.
The bug first appeared in 2012 and was now on its third iteration, he said, adding that the latest version had been rewritten recently and was now as sophisticated as the malware aimed at desktop computers.The bug first appeared in 2012 and was now on its third iteration, he said, adding that the latest version had been rewritten recently and was now as sophisticated as the malware aimed at desktop computers.
"They are successful enough to make it worth ripping out the back end of the malware to make it be much more stable and resistant to efforts to take it down," he said."They are successful enough to make it worth ripping out the back end of the malware to make it be much more stable and resistant to efforts to take it down," he said.
This latest version employed end-to-end encryption, peer-to-peer networking technologies and stealthy operating procedures to help it avoid being spotted and removed, he said.This latest version employed end-to-end encryption, peer-to-peer networking technologies and stealthy operating procedures to help it avoid being spotted and removed, he said.
Phones infected with NotCompatible were enrolled into a network that is now being rented out to any crime group that needs a ready source of Android users.Phones infected with NotCompatible were enrolled into a network that is now being rented out to any crime group that needs a ready source of Android users.
Mr Linden said compromised phones had been used in a variety of scams including sending spam, attacking Wordpress blogs and buying tickets for popular events in bulk that would then be resold at a significant profit.Mr Linden said compromised phones had been used in a variety of scams including sending spam, attacking Wordpress blogs and buying tickets for popular events in bulk that would then be resold at a significant profit.
"This is the most technically sophisticated threat we are facing and it's the most worrying to us," said Mr Linden."This is the most technically sophisticated threat we are facing and it's the most worrying to us," said Mr Linden.
NotCompatible is being spread via spam and websites seeded with booby-trapped downloads, he said and urged Android users to be wary of any app that required a security update to be installed before it was run.NotCompatible is being spread via spam and websites seeded with booby-trapped downloads, he said and urged Android users to be wary of any app that required a security update to be installed before it was run.
'Growing confidence''Growing confidence'
Mobile malware was growing in popularity among cybercrime groups because smartphones were now so central to modern life, said Eldar Tuvey from mobile security monitoring firm WanderaMobile malware was growing in popularity among cybercrime groups because smartphones were now so central to modern life, said Eldar Tuvey from mobile security monitoring firm Wandera
"We're definitely seeing the bad guys focus their attention on mobiles," he said. "That's because more time is now spent on apps on phones than desktops.""We're definitely seeing the bad guys focus their attention on mobiles," he said. "That's because more time is now spent on apps on phones than desktops."
While Android had long been a target of malware makers, the appearance of the Wirelurker and Masque malware families that both targeted Apple gadgets showed the growing confidence of cybercriminals, he said.While Android had long been a target of malware makers, the appearance of the Wirelurker and Masque malware families that both targeted Apple gadgets showed the growing confidence of cybercriminals, he said.
They were keen to get a foothold on a phone so they could harvest useful data that they could sell or use to make phishing emails look more plausible, or to lever open accounts for social networks or other web-based services.They were keen to get a foothold on a phone so they could harvest useful data that they could sell or use to make phishing emails look more plausible, or to lever open accounts for social networks or other web-based services.
With 70% of people reusing passwords across many different sites and services, it was no surprise that criminals regularly got access to these accounts, he said.With 70% of people reusing passwords across many different sites and services, it was no surprise that criminals regularly got access to these accounts, he said.
Many were aided by "leaky" apps that passed around log-in names, email addresses and other credentials in unencrypted text, said Mr Tuvey.Many were aided by "leaky" apps that passed around log-in names, email addresses and other credentials in unencrypted text, said Mr Tuvey.
"The trend is only moving in one direction," he said. "The criminals are sharing information between themselves and they are learning about how to improve the efficiency of their attacks.""The trend is only moving in one direction," he said. "The criminals are sharing information between themselves and they are learning about how to improve the efficiency of their attacks."