3 Tools to Aware Of That Exploit Android Security Vulnerability

P { margin-bottom: 0.08in; direction: ltr; color: rgb(0, 0, 0); text-align: left; }P.western { font-family: “Times New Roman”,serif; font-size: 12pt; }P.cjk { font-family: “SimSun”,”??”; font-size: 12pt; }P.ctl { font-family: “Mangal”,serif; font-size: 12pt; }A:link { color: rgb(0, 0, 255); }

is slowly becoming a popular target for hackers and other
cyber-criminals world wide. Malware developers are now exploiting the
security vulnerabilities found in Android with specific tools that
can be modified to “trojanize” any legitimate app. Many of these
tools are remote administration tools or RATs that allow the attacker
to remotely control the device remotely with a user friendly


is a free and open source remote administration tool designed for
Android. This tool allows the attacker to control a wide variety of
features within the infected smartphone. Some of the AndroRat’s
innovative features include the ability to make phone calls, send
messages from the infected phone, access the GPS coordinated of the
phone, activate the microphone, access stored data and much more.

APK Binder

APK Binder is a malware tool that allows you to bind AndroRat
directly to an app. The APK Binder is currently being sold at about
$37 through various underground forums. The tool AndroRat is
available in the APK format and when combined with the APK builder
will allow any user with minimum expertise to infect a legitimate app
and trojanize it. When a user installs the trojanized app, they also
install AndroRat unknowingly. The attacker can now access the
infected phone remotely and use it for their benefit.


similar lines as the AndroRat, a Java based RAT that has been named
as Adwind is also making rounds on the Internet. This tool can be
used in multiple OSes as it is a Java based tool. This tool too can
assume control of an infected device remotely. However, it is not yet
known if the tool has been bound to any of the legitimate APKs.

of infection

far, there have been over 20 cases of legitimate apps being infected
by AndroRat. In addition to this, over a few hundred cases of
infected devices have already been reported world wide with a
majority of the infections talking place in Turkey and the U.S. The
number of infections is also on the rise and is bound to continue as
the malware tool gets refined with new features and options. The open
source nature of the tool has made it gain quick popularity. As a
result, the tool may also evolve and grow to become a greater threat
than it already is.

About the Author

P { margin-bottom: 0.08in; direction: ltr; color: rgb(0, 0, 0); widows: 2; orphans: 2; }P.western { font-family: “Times New Roman”,serif; font-size: 12pt; }P.cjk { font-family: “Times New Roman”,serif; font-size: 12pt; }P.ctl { font-family: “Times New Roman”,serif; font-size: 12pt; }A:link { color: rgb(0, 0, 255); }

Seth Williams has been writing with Firebox Training, since
July, 2011. He writes on many topics across IT programming, Firebox Oracle ADF training and developments in the industry.
Through spreading wisdom across forums and tech blogs, Seth has
realized an open source approach to training professionals across the
globe is the way to go.

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Android Tips and Tricks for Getting the Most from Your Phone

Gone are the days when phones were only used to make phone calls and send text messages; nowadays, smartphones are more akin to a...

What Proxies Are For

When you cannot access certain sites or hide your identity, you need a tool for that. For example, the USA proxies are in demand...

Mobile Device Safety: Keeping your phone safe from intrusion

You might have heard that the iPhone is almost completely impossible to hack or that Samsung devices have some of the best firewalls in...

How to Detect Phishing Mails and Websites

Not long ago, phishing websites and mails looked quite unprofessional, they were peppered with spelling mistakes and had a distrustful design. Nowadays the digital...