As per F-Secure, a new Android Trojan named ADRD has been found in the wild. This Trojan has been concealed inside repackaged wallpaper-related applications hosted by a Chinese provider.
This Trojan once installed, will start to execute at every start-up and interferes with data connections. It can also access SD card as well as APN settings. It then sends the phone’s info including IMEI and SIM ID to a remote host. Researchers have also detected a self-updater component, which can be downloaded and executed.
Here is an example of an infected application
An installed application infected with ADRD may show these permissions
I am a freelance programmer and tech enthusiast. In my spare time, I contribute to this website.
Help Us Grow
If you like this post, please share it with your friends.
You are free to copy and redistribute this article in any medium or format, as long as you keep the links in the article or provide a link back to this page.
Our website uses cookies to provide you with the best user experience possible. These cookies are stored in your browser
and perform essential functions such as recognizing you when you return to our website, as well as helping us to understand
which sections of the website you find most useful and engaging.
Strictly Necessary Cookies must always be enabled to ensure the proper functioning of this website and to allow us to provide you with excellent service. These cookies are also essential for saving your cookie preferences.
Google Adsense
We use Google AdSense to keep this site free by displaying relevant ads. AdSense requires essential cookies that cannot be disabled, but you can manage other cookies. We respect your privacy and provide options to control non-essential cookies.
For more details on how Google handles your data, visit Google's Data Usage Policy. Please review our Privacy Policy for more information on how we protect your data.
AddToAny
We use AddToAny for social sharing. It doesn’t store cookies, ensuring a privacy-friendly experience. AddToAny complies with GDPR and CCPA by default.
We use OneSignal to send notifications to users who opt in. OneSignal complies with GDPR and is certified under the EU-US and Swiss-US Privacy Shield frameworks.
This website utilizes third-party cookies, which can enhance your experience and support our ongoing efforts to improve our services.
Google Analytics
We use Google Analytics to collect anonymous data, such as visitor numbers and popular pages, to improve user experience and site performance. Keeping this cookie enabled helps us refine the site based on visitor activity.