{"id":5280,"date":"2016-03-14T16:50:24","date_gmt":"2016-03-14T16:50:24","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5280"},"modified":"2020-02-26T11:05:58","modified_gmt":"2020-02-26T16:05:58","slug":"rise-of-the-triada","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/rise-of-the-triada\/5280\/","title":{"rendered":"Rise of the Triada: mobile malware becomes very sophisticated"},"content":{"rendered":"<p>In late February, Kaspersky Lab reported the emergence of one of the most dangerous Android-oriented malware known as Acecard, and now there\u2019s <a href=\"https:\/\/www.kaspersky.com\/about\/news\/virus\/2016\/Kaspersky-Lab-Discovers-Triada\" target=\"_blank\" rel=\"noopener nofollow\">a new discovery<\/a>: a complex, stealthy, and professionally written malware suite codenamed \u201cTriada\u201d. While this is mostly a consumer-level threat, Triada is also potentially dangerous to mobile apps-related businesses.<\/p>\n<p><strong>Not just one but three<\/strong><\/p>\n<p>Triada is now an \u201cumbrella\u201d name, covering\u00a0three mobile Trojan families which share an application loader and installation modules. These Trojans \u2013 Ztorg, Gorpo, and Leech \u2013 work in cooperation with each other, and the infected devices are getting organized into a sort of advertising botnet that threat actors can use to install different kinds of adware.<\/p>\n<p>However, the most outstanding feature of Triada is that it gains super-user (root) privileges.<\/p>\n<p><strong>Going for the brain<\/strong><\/p>\n<p>Last year Securelist <a href=\"https:\/\/securelist.com\/blog\/mobile\/71981\/taking-root\/\" target=\"_blank\" rel=\"noopener\">pointed out<\/a>\u00a0the increasing popularity of malware for Android that gains root access to a device and uses it to install apps and display aggressive advertising.\u00a0Sometimes it is so aggressive that the device becomes nearly unusable due to the sheer number of annoying ads and apps being installed without a user\u2019s consent.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Rise of the #Triada: mobile #malware becomes really sophisticated. #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F2pmZ&amp;text=Rise+of+the+%23Triada%3A+mobile+%23malware+becomes+really+sophisticated.+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Securelist authors predicted that one day these advertising Trojans would start spreading malicious, money-stealing malware.\u00a0This proved to be true.<\/p>\n<p>\u201cRooting malware has begun spreading the most sophisticated mobile Trojans we have ever seen\u201d, <a href=\"https:\/\/securelist.com\/analysis\/publications\/74032\/attack-on-zygote-a-new-twist-in-the-evolution-of-mobile-threats\/\" target=\"_blank\" rel=\"noopener\">said<\/a> Securelist\u2019s Nikita Buchka and Mikhail Kuzin.<\/p>\n<p>The aforementioned advertising botnet is now serving the victims with a unique Trojan that has modular functionality with active use of superuser privileges. Its main part exists in device RAM only, which makes it almost impossible to detect and delete using antimalware solutions. Triada also implements itself into all processes running on the device.<\/p>\n<p>Disturbingly, Triada uses <a href=\"https:\/\/anatomyofandroid.com\/2013\/10\/15\/zygote\/\" target=\"_blank\" rel=\"noopener nofollow\">Zygote<\/a> \u2013 the parent of the application process on an Android device \u2013 that contains system libraries and frameworks used by every application installed on the device.<\/p>\n<p>In other words, it\u2019s a daemon whose purpose is to launch Android applications. This is a standard app process that works for every newly installed application. It means that as soon as the Trojan gets into the system, it becomes part of the app process and will be pre-installed into any application launching on the device, and can even change the logic of the application\u2019s operations. The primary goal of this is absolute persistence.<\/p>\n<p>Securelist authors also point out that there are \u201cindustrial approaches\u201d used in Triada\u2019s development, which suggest very high qualification of its authors.<\/p>\n<p>These people know very well what they want and how to achieve it.<\/p>\n<p><strong>And what they want is money<\/strong><\/p>\n<p>The main function of the Trojan is to redirect financial SMS transactions when the user makes online payments to buy additional content in legitimate apps. The money goes to the attackers rather than to the software developer.<\/p>\n<p>Depending on whether or not the user gets the content he pays for, the Trojan either steals the money from the user (if the user does not receive the content) or from the legitimate software developers (if the user receives the content).<\/p>\n<p>In other words, Triada is potentially damaging to the entire mobile apps market.<\/p>\n<p>Securelist says that the range of techniques Triada employs so far hasn\u2019t been found in any other known mobile malware: \u201cThe methods of concealing and achieving persistence used by Triada can effectively avoid detection and removal of all malware components after installation on the infected device; the modular architecture allows attackers to extend and alter the functionality so they are limited only by the capabilities of the operating system and applications installed on the device.\u201d<\/p>\n<p>And the fact that Triada penetrates all applications installed in the system means the criminals can implement new attack vectors against users and further maximize their profits.<\/p>\n<p>Securelist authors compare Triada\u2019s complexity to Windows malware, saying that the evolution of Android threats has just moved to a new level.<\/p>\n<p>The full text of Securelist\u2019s report on Triada is available <a href=\"https:\/\/securelist.com\/analysis\/publications\/74032\/attack-on-zygote-a-new-twist-in-the-evolution-of-mobile-threats\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-5285\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/03\/06020442\/tentacles2.jpg\" alt=\"tentacles2\" width=\"1000\" height=\"707\"><\/p>\n<p><strong>Mitigation and removal<\/strong><\/p>\n<p>Kaspersky Lab products detect Triada\u2019s components as:<\/p>\n<ul>\n<li>Trojan-Downloader.AndroidOS.Triada.a;<\/li>\n<li>Trojan-SMS.AndroidOS.Triada.a;<\/li>\n<li>Trojan-Banker.AndroidOS.Triada.a;<\/li>\n<li>Backdoor.AndroidOS.Triada.<\/li>\n<\/ul>\n<p>Preventing Triada from getting in is a bit easier than having to remove it after the infection.\u00a0In fact, it\u2019s next to impossible to uninstall this malware from the device.\u00a0Users face two options to get rid of it. The first is to \u201croot\u201d their device and delete the malicious applications manually. The second option is to jailbreak the Android system on the device.\u00a0This is not something that we would normally recommend, but Triada is not a \u201cnormal\u201d case.<\/p>\n<p>Take a look at\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/rooting-and-jailbreaking\/1979\/\" target=\"_blank\" rel=\"noopener nofollow\">pros and cons of rooting and jailbreaking at Kaspersky Daily.<\/a><\/p>\n<p>It is important to note that Triada hits users of Android version 4.4.4 and earlier. Later versions have much fewer vulnerabilities that can be exploited by malware to gain root access.\u00a0So if there is an option to upgrade the system, it is worth doing ASAP.<\/p>\n<p><strong>Historic parallels<\/strong><\/p>\n<p>While Securelist compares Triada to Windows malware due to its complexity, there are other parallels as well.<\/p>\n<p>Windows has become the most malware-targeted system mostly due to its popularity among consumers and lax security. This attracted\u00a0the hordes of\u00a0malware writers, and though there was not much malware in the early 1990s, ten years later we have observed global pandemics of viruses attacking Windows-based machines, and now the number of malware samples discovered by Kaspersky Lab\u2019s experts is well north of\u00a0300k pieces per day. Most of this is Windows malware.<\/p>\n<p>Gradually the malware writers switched from general vandalism to profiting from their code, something that we\u2019re seeing a lot of today.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>In pursuit for money, malware authors now\u00a0write very complex mobile #Trojans<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F2pmZ&amp;text=In+pursuit+for+money%2C+malware+authors+now%C2%A0write+very+complex+mobile+%23Trojans\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Now, there\u2019s Android. The most popular mobile platform around (Okay, Google, thanks), and, consequently, <a href=\"https:\/\/business.kaspersky.com\/android-financial-attacks-and-current-security-status\/3901\" target=\"_blank\" rel=\"noopener nofollow\">the most targeted\u00a0one.<\/a> Its early versions were launched when the mobile malware was few and far between. Now, it\u2019s fair to say that Android turned out to be the\u00a0richest soil for mobile malware to grow \u2013 in numbers, and now in sophistication as well. Reasons are multiple, and we touched on them earlier.\u00a0Regardless, Google made grand efforts to improve security, but the adoption rate of newer versions yearns for improvement: <a href=\"https:\/\/developer.android.com\/about\/dashboards\/index.html\" target=\"_blank\" rel=\"noopener nofollow\">as of March, 2016, around 36% of Android devices run version 5.x (Lollipop) released in 2014, while version 6.0 (Marshmallow), released in October 2015 has a slim share of 2.3%.\u00a0<\/a><\/p>\n<p>Both consumers and businesses learned to protect\u00a0their Windows-based endpoints with time. It is now necessary to understand that mobile malware is equally dangerous and damaging, and to see to it that it doesn\u2019t slip\u00a0onto our devices.<\/p>\n<p><strong>Kaspersky Endpoint Security for Business<\/strong> (<em>Select<\/em>, <em>Advanced<\/em> and <em>Total<\/em> editions) provides businesses with robust security of corporate mobile devices, protecting from the prevalent mobile-borne threats such as phishing, spam, malware and launch of unauthorized applications, etc. Importantly, rooting and jailbreaking incidents are detected automatically, which provides an extra layer of protection from Triada and other rooting malware, and the infected devices are getting blocked before any harm can be inflicted upon the corporate infrastructure. For more information on Kaspersky Endpoint Security please visit <a href=\"https:\/\/www.kaspersky.com\/business-security\/small-to-medium-business\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Triada is a complex, stealthy, and professionally written malware suite. While it is mostly a consumer-level threat, Triada is also potentially dangerous to mobile apps-related businesses.<\/p>\n","protected":false},"author":209,"featured_media":15446,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2049,537,1475],"class_list":{"0":"post-5280","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-kaspersky-endpoint-security-for-business","10":"tag-mobile-malware","11":"tag-triada"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/rise-of-the-triada\/5280\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/rise-of-the-triada\/5280\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/rise-of-the-triada\/5280\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/kaspersky-endpoint-security-for-business\/","name":"Kaspersky Endpoint Security for Business"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5280"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5280\/revisions"}],"predecessor-version":[{"id":33652,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5280\/revisions\/33652"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15446"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}