[!(http://1.bp.blogspot.com/-oY7RTNMJgRM/TVyNkQHR8cI/AAAAAAAAAU4/HbhIV7BHSYg/s200/android_trojan.jpg)](http://1.bp.blogspot.com/-oY7RTNMJgRM/TVyNkQHR8cI/AAAAAAAAAU4/HbhIV7BHSYg/s1600/android_trojan.jpg)Mobile malware is still a fringe development, but it’s not inconceivable that you’d run into it. If you use an Android device, here’s one example of what it would look like. () [F-Secure describes ADRD, which they detect as Trojan:Android/Adrd.A, in a blog entry](http://www.f-secure.com/weblog/archives/00002100.html). The malware was [originally found by Aegislab](http://blog.aegislab.com/index.php?op=ViewArticle&articleId=75&blogId=1). F-Secure says that it appears to be distributed only in Chinese markets and may only be specific to Chinese networks.
Below is the application info screen, which doesn’t say much that’s informative.
Both companies say that wallpaper is a common mode of distribution for such apps. Often they are infected repackaged versions of legit wallpaper or some other app.
The app, of course, reserves for itself extensive permissions on the device.
The program contacts a host in the background, downloads a list of search URLs and then performs those searches at random in the background, so it could lead to excessive data charges.
Subscribe to Time to Hack
Get the latest posts delivered right to your inbox