Mobile security worm threat targets Android devices

The Selfmite malware has been spreading its way through smartphones by way of links in text messages.

A new mobile security threat in the form of the Selfmite Android malware has been making the rounds through a malicious link that is being distributed by way of text messages to the contacts on the device user’s list.

This link leads to a rare Android worm that has now been discovered by security researchers.

By the time this Selfmite mobile security threat is installed onto a device, this malware texts 20 contacts from the address book of the smartphone owner. This is a different type of threat from what is usually seen over Android devices, as the majority of those problems are in the form of Trojan apps that do not have their own mechanisms for self propagation. Instead, they are distributed to smartphone and tablet users by way of non-official app stores.

This new mobile security problem is the second threat of this nature that has been discovered in the last 2 months.

This may suggest that the number of malware attacks in the form of worms could be on the rise into the future. The text message that is sent by the Selfmite worm contains the name of the contact, so that it says “Dear [Contact’s Name], Look the Self-time,” and is followed by a URL that has been shortened.Mobile security worm threat

This infected link directs the user to an APK file that is called “TheSelfTimerV1.apk”. This Android application file is hosted on a remote server, according to the AdaptiveMobile security firm researchers who identified the threat. If the user chooses to install this APK, then “The self-timer” is placed into the app list.

From that point, it not only spreads itself to 20 contacts through texts from that device, but it also attempts to encourage that device’s user to download and install another file, which is called mobogenie_122141003.apk through their mobile browser.

That is actually a legitimate app called Mobogenie, which gives Android users the chance to synch their devices with their PCs so that they can download applications form an alternative app store. That application has already received over 50 million downloads from Google Play but is heavily promoted through affiliate marketing strategies, which can incentivize fraudulent distribution by unethical individuals willing to use mobile security threats to try to make money.

Add a Comment

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.