Ghost Push

From Infogalactic: the planetary knowledge core
Jump to: navigation, search

Lua error in package.lua at line 80: module 'strict' not found.

Ghost Push is kind of malware which infects the Android OS by automatically gaining root access, download malicious software, convert to system app and then losing root access which virtually impossible to remove the infection by factory reset unless the firmware is reflashed. The malware hogs all system resources making it unresponsive and drains the battery. The advertisements always appeared anytime either full screen, part of a display, or in status bar. The unnecessary apps is automatically activate and sometimes downloads another malicious software when connected to the internet. It is harder to detect and steals user information.[1]

History

It was discovered in September 18, 2015 by Cheetah Mobile's CM Security Research Lab.[2][3][4][5][6]

Further investigation of Ghost Push revealed more recent variants, which, unlike older ones, employ the following routines that make them harder to remove and detect:[7]

  • encrypt its APK and shell code,
  • run a malicious DEX file without notification,
  • add a “guard code” to monitor its own processes,
  • rename .APK (Android application package) files used to install the malicious apps,
  • and launch the new activity as the payload.

References

  1. http://www.theinquirer.net/inquirer/news/2428494/ghost-push-malware-is-putting-the-willies-up-android-users
  2. Lua error in package.lua at line 80: module 'strict' not found.
  3. Lua error in package.lua at line 80: module 'strict' not found.
  4. Lua error in package.lua at line 80: module 'strict' not found.
  5. Lua error in package.lua at line 80: module 'strict' not found.
  6. Lua error in package.lua at line 80: module 'strict' not found.
  7. http://blog.trendmicro.com/trendlabs-security-intelligence/new-ghost-push-variants-sport-guard-code-malware-creator-published-over-600-bad-android-apps/