Android DroidDream nightmare continues
Android security fears escalate again thanks to researchers spotting more trojanised apps.


A week after Google had to remove a host of apps infected with DroidDream malware, two major security firms have spotted further issues affecting Android.
When the Lookout Security Team discovered 50 applications on the Android market infected with a "stripped down" version of DroidDream, they were delivered across five developer accounts.
Lookout estimated between 30,000 and 120,000 users were hit by DroidDreamLight when it reported on the situation in May.
Symantec said today it had found additional publisher accounts pushing out apps containing the so-called DroidDreamLight malware.
Those accounts have now been disabled, however, and Symantec said the actual threat from DroidDreamLight was not as significant as its predecessor.
"The key point to note is that even though the news of the return of Droid Dreams' has created a bit of a stir with approximate high download rates being quoted - due to the fact that the threat was available through official channels - unlike its predecessor, this threat does not carry out any system level exploits and does not require the infected user to carry out any complex steps to restore the device back to the pre-infection state," Symantec explained in a blog post.
"At its core, Android.Lightdd is a downloader Trojan, but with certain caveats. The threat is subject to the Android security model, therefore any download attempts will not work, as long as the user does not consent to the installation of the suggested app."
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
In March, Google promised to up its security game after over 50 DroidDream infected apps were found on the Android Market and subsequently removed.
Kung Fu Droid
But security fears surrounding Android have not subsided this week.
F-Secure discovered another piece of Android malware using a root exploit and delivered inside an application, which it detected as Trojan:Android/DroidKungFu.A.
The malware could delete specific files on infected devices, or even run certain apps on a phone or tablet, F-Secure said in a blog post today.
It could also harvest information, including users' mobile number, phone model and IMEI number.
Researchers at North Carolina University also spotted DroidKungFu on more than eight third-party Android app stores and forums based in China.
The researchers claimed the malware could avoid detection by mobile anti-virus software, whilst doing some "nasty" things.
"In Android versions 2.2 (Froyo) and earlier, DroidKungFu takes advantage of two vulnerabilities in the platform software to install a backdoor that gives hackers full control of your phone," a post on the university's website read.
"Not only do they have access to all of your user data, but they can turn your phone into a bot and basically make your smartphone do anything they want."
Trojanised apps featuring DroidKungFu have not been spotted on the official Android Market.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
CronRat Magecart malware uses 31st February date to remain undetected
News The malware allows for server-side payment skimming that bypasses browser security
By Rene Millman Published
-
Mekotio trojan continues to spread despite its operators’ arrests
News Hackers have used it in 100 more attacks since arrests
By Rene Millman Published
-
“Trojan Source” hides flaws in source code from humans
News Organizations urged to take action to combat the new threat that could result in SolarWinds-style attacks
By Rene Millman Published
-
What is Emotet?
In-depth A deep dive into one of the most infamous and prolific strains of malware
By Praharsha Anand Last updated
-
Fake AnyDesk Google ads deliver malware
News Malware pushed through Google search results
By Rene Millman Published
-
Hackers use open source Microsoft dev platform to deliver trojans
News Microsoft's Build Engine is being used to deploy Remcos password-stealing malware
By Rene Millman Published
-
Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web
News The source code for the authenticator-breaking malware is available for free on underground forums
By Sabina Weston Published
-
Qbot malware surges into the top-ten most common business threats
News An evolved form of the banking Trojan was distributed by number one-ranking Emotet in a campaign that hit 5% of businesses globally
By Keumars Afifi-Sabet Published