3 Tools to Aware Of That Exploit Android Security Vulnerability

P { margin-bottom: 0.08in; direction: ltr; color: rgb(0, 0, 0); text-align: left; }P.western { font-family: “Times New Roman”,serif; font-size: 12pt; }P.cjk { font-family: “SimSun”,”??”; font-size: 12pt; }P.ctl { font-family: “Mangal”,serif; font-size: 12pt; }A:link { color: rgb(0, 0, 255); }

is slowly becoming a popular target for hackers and other
cyber-criminals world wide. Malware developers are now exploiting the
security vulnerabilities found in Android with specific tools that
can be modified to “trojanize” any legitimate app. Many of these
tools are remote administration tools or RATs that allow the attacker
to remotely control the device remotely with a user friendly


is a free and open source remote administration tool designed for
Android. This tool allows the attacker to control a wide variety of
features within the infected smartphone. Some of the AndroRat’s
innovative features include the ability to make phone calls, send
messages from the infected phone, access the GPS coordinated of the
phone, activate the microphone, access stored data and much more.

APK Binder

APK Binder is a malware tool that allows you to bind AndroRat
directly to an app. The APK Binder is currently being sold at about
$37 through various underground forums. The tool AndroRat is
available in the APK format and when combined with the APK builder
will allow any user with minimum expertise to infect a legitimate app
and trojanize it. When a user installs the trojanized app, they also
install AndroRat unknowingly. The attacker can now access the
infected phone remotely and use it for their benefit.


similar lines as the AndroRat, a Java based RAT that has been named
as Adwind is also making rounds on the Internet. This tool can be
used in multiple OSes as it is a Java based tool. This tool too can
assume control of an infected device remotely. However, it is not yet
known if the tool has been bound to any of the legitimate APKs.

of infection

far, there have been over 20 cases of legitimate apps being infected
by AndroRat. In addition to this, over a few hundred cases of
infected devices have already been reported world wide with a
majority of the infections talking place in Turkey and the U.S. The
number of infections is also on the rise and is bound to continue as
the malware tool gets refined with new features and options. The open
source nature of the tool has made it gain quick popularity. As a
result, the tool may also evolve and grow to become a greater threat
than it already is.

About the Author

P { margin-bottom: 0.08in; direction: ltr; color: rgb(0, 0, 0); widows: 2; orphans: 2; }P.western { font-family: “Times New Roman”,serif; font-size: 12pt; }P.cjk { font-family: “Times New Roman”,serif; font-size: 12pt; }P.ctl { font-family: “Times New Roman”,serif; font-size: 12pt; }A:link { color: rgb(0, 0, 255); }

Seth Williams has been writing with Firebox Training, since
July, 2011. He writes on many topics across IT programming, Firebox Oracle ADF training and developments in the industry.
Through spreading wisdom across forums and tech blogs, Seth has
realized an open source approach to training professionals across the
globe is the way to go.

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...