TimpDoor Android malware turning devices into hidden proxies
SecureHackWorld Posted by SecureWorld on October 26, 2018 Android users in North America are the current target of TimpDoor malware. The McAfee Mobile Research team has identified an active phishing campaign that traps users by sending an SMS to influence them on downloading and installing an Android malware app TimpDoor. It is a fake voice-message app that allows attackers to infect the devices and use them as network proxies, without raising suspicion. Once TimpDoor is installed, a Socks proxy service is initiated in the background, which is responsible for redirecting the entire traffic on the network from a third-party server through an encrypted connection facilitated by a secure shell tunnel. This lets attackers get access to internal networks of the system after evading the implemented network security methods like network monitors and firewal...