A bootkit Malware began to expand. When initially, Bootkit many circulating on the PC, the malware has already started now detected on Android-based devices.
Such threats are detected with the name "Android Oldboot. 1" home network security company by Russia, Doctor Web. The company claims that this is malware bootkit first on Android devices.
Bootkit itself is a variant of rootkit that can infect the startup code, or when users turn on the device. Later on, the code that have been infected can be used to attack the encryption system device. He also will be difficult because the malware is removed within the file system of the device.
Fortunately, as quoted from the Web, The Next Saturday (8/2/2014), how the spread of Android. Oldboot. 1 is not the same with other malicious programs. The Program does not spread through web sites, attachment, or malicious applications. Most likely, that the kind of malware deliberately inserted through access to a mobile phone or tablet with Android.
Doctor Web explains, a person can infect an Android device by placing one of the components of the trojan into the file system of the boot partition and modify a particular file. When users turn on your device, the files that have been modified it will start spreading the trojan to some specified folder.
After terinjeksi to the system, Android Oldboot. 1 can be used by the cyber criminals to connect the device to a remote server. Through this server, the villain may order the device to download, install, or remove any application remotely.
To date, there has been no reports stating that the bootkit has spread in Indonesia. Worldwide, there have been 350,000 infected Android devices, including from Spain, Italy, Germany, Russia, Brazil, the u.s., and some countries in Southeast Asia. Most of these cases, about 92 per cent, found in China.