New research from Lookout Mobile Security suggests the DroidDream malware is designed to extend the botnet threat to mobile devices — Android, in this case.Lookout first contacted me about this malware last week, and since then security news headlines have been ablaze with details about a tainted Android app market. Sign up today.Get your morning news fix with the daily Salted Hash e-newsletter! Here’s the latest raw research from Lookout, sent to me by company spokesperson Cerena Hsieh: Lookout has taken a closer look at DroidDream to further understand the malware’s intent. We found that DroidDream could be considered a powerful zombie agent that can install any applications silently and execute code with root privileges at will; it is the first piece of Android malware we’ve seen that uses an exploit to gain root permissions, thereby giving it a substantial amount of control over an infected device. Additionally, the malware is very aptly named – it was configured to only run in the evening (from 11 p.m. to 8 a.m.) — a time when the owner of an infected device would most likely be sleeping and not notice any strange behaviors on the phone. After analyzing the second phase of DroidDream, we’ve concluded that its purpose is to download additional applications and install them silently as system applications on the device. The first phase of the malware served to gain root access on the device while the second phase predominantly serves to maintain a connection to the server to download and install other files. Other findings:-The second stage of the malware sends additional personal information to its command and control server:-ProductID – Specific to the DroidDream variant-Partner – Specific to the DroidDream variant -IMSI-IMEI-Model & SDK value-Language -Country-UserID (Though this does not appear to be fully implemented)-Applications supplied by DroidDream’s command and control center can be silently downloaded to the infected device. In the malware, there also appears to be a command dealing with ratings, comments, assetIDs and install states, all of which relate to the Android Market. Though these appear incomplete, it’s possible the author(s) intended to listen to Android Market downloads and possibly to trigger downloads and comments on downloaded applications.one-stop view of latest business threats. We created it for you! Bookmark it! Use it!CSO’s Daily Dashboard gives you a As everyone’s attention shifts to smartphones, Android is emerging as the target of choice. Perhaps I oversimplify things, but where there’s a surge in market share, there tends to be the most smoke and fire.So when a company like Lookout suggests Androids are now the target of botnet herders, I tend to believe it.Contributing writer Robert Lemos is digging into this issue more deeply, and we’ll have more to report on this in the coming days.–Bill Brenner Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe