hiddenFeb 21, 2015 09:10:43 IST
After triggering a cyber world conflict between the US and North Korea, a potent virus masquerading under the pseudonym of Hollywood movie, The Interview, has been seen prowling in the Indian cyberspace to attack and damage Android-based smart phones.
Cyber security sleuths have detected the activity of this 'Trojan' category virus in the domestic Internet circuit which falsely leads a user to download the much talked about international film leading to compromising of secret private information of a genuine smart phone user.
"Once installed (the virus), the application will display an icon using imagery from the poster of the movie The Interview. When the Trojan is being installed, it requests permissions to perform either open network connections, write to external storage devices or install application packages.
"When the app (application) is installed, it claims to allow users to watch the movie The Interview for free but instead installs a two-stage banking Trojan onto infected devices," the Computer Emergency Response Team of India (CERT-In) said in its latest advisors.
The CERT-In is the nodal agency to combat hacking, phishing and to fortify security-related defences of the Indian Internet domain.
While a 'Trojan' virus, under cyber protocols, is the most deadly variety of an online malware as it cleverly cheats a user into downloading spam into his system, the movie The Interview featured a fictional plot to assassinate North Korean leader Kim Jong-un and was produced by Sony pictures under the banner of its Hollywood films unit.
The film was scheduled for a Christmas release last year but Sony became the target of the biggest cyberattack in US corporate history just before this, as a result of which it cancelled the film's theatrical release and it was eventually screened in select art-house cinemas and released on the Internet and via cable TV providers.
The deadly virus, also called 'Badaccents', is a premium service banking Trojan that arrives bundled with legitimate Android applications and infects smart phones featuring this operating system. "The Trojan is created by modifying the legitimate application and then re-distributing via marketplace or other separate channels," the cyber security agency said.
Find latest and upcoming tech gadgets online on Tech2 Gadgets. Get technology news, gadgets reviews & ratings. Popular gadgets including laptop, tablet and mobile specifications, features, prices, comparison.