{
	"id": "29ec59c3-5aca-46b4-aaeb-654d0bb47714",
	"created_at": "2026-04-06T00:13:09.009228Z",
	"updated_at": "2026-04-10T03:30:33.173634Z",
	"deleted_at": null,
	"sha1_hash": "fa5e25d5296d92b4b3a0c9f8d2d96e6bf709f068",
	"title": "Windows malware tries to infect Android devices connected to PCs",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 36139,
	"plain_text": "Windows malware tries to infect Android devices connected to PCs\r\nBy Lucian Constantin\r\nPublished: 2014-01-23 · Archived: 2026-04-05 21:15:50 UTC\r\nA new computer Trojan program attempts to install mobile banking malware on Android devices when they’re\r\nconnected to infected PCs, according to researchers from Symantec.\r\nThis method of targeting Android devices is unusual, since mobile attackers prefer social engineering and fake\r\napps hosted on third-party app stores to distribute Android malware.\r\n“We’ve seen Android malware that attempts to infect Windows systems before,” Symantec researcher Flora Liu,\r\nsaid Thursday in a blog post. “Android.Claco, for instance, downloads a malicious PE [portable executable] file\r\nalong with an autorun.inf file and places them in the root directory of the SD card. When the compromised mobile\r\ndevice is connected to a computer in USB mode, and if the AutoRun feature is enabled on the computer, Windows\r\nwill automatically execute the malicious PE file.”\r\n“Interestingly, we recently came across something that works the other way round: a Windows threat that attempts\r\nto infect Android devices,” Liu said.\r\nThe new malware, dubbed Trojan.Droidpak by Symantec, drops a DLL file on the Windows computer and\r\nregisters a new system service to ensure its persistence across reboots. It then downloads a configuration file from\r\na remote server that contains the location of a malicious APK (Android application package) file called AV-cdk.apk.\r\nThe Trojan program downloads the malicious APK, as well as the Android Debug Bridge (ADB) command line\r\ntool that allows users to execute commands on Android devices connected to a PC. ADB is part of the official\r\nAndroid software development kit (SDK).\r\nThe malware executes the “adb.exe install AV-cdk.apk” command repeatedly to ensure that if an Android device is\r\nconnected to the host computer at any time, the malicious APK is silently installed on it. However, this approach\r\nhas a limitation — it will work only if an option called “USB debugging” is enabled on the Android device.\r\nUSB debugging is a setting normally used by Android developers, but it’s also required for some operations that\r\nare not directly related to development, like rooting the OS, taking screen captures on devices running old Android\r\nversions or installing custom Android firmware. Even if this feature is rarely used, users who turn it on once to\r\nperform a particular task may forget to disable it when they don’t need it anymore.\r\nThe malicious APK distributed by this Windows malware is detected by Symantec as Android.Fakebank.B and\r\nmasquerades as the official Google Play application. Once installed on a device, it uses the name “Google App\r\nStore” and the same icon as the legitimate Google Play app.\r\nThe malware appears to target online banking users from South Korea.\r\nhttps://www.computerworld.com/article/2486903/windows-malware-tries-to-infect-android-devices-connected-to-pcs.html\r\nPage 1 of 2\n\n“The malicious APK actually looks for certain Korean online banking applications on the compromised device\r\nand, if found, prompts users to delete them and install malicious versions,” Liu said. It also intercepts SMS\r\nmessages received by the user and sends them a remote server.\r\nThe targeting of online banking apps and the theft of SMS messages that can contain transaction authorization\r\nsent by banks suggest the motivation of this malware’s authors is bank fraud.\r\nEven if this particular threat targets users from a single country, malware coders commonly borrow ideas from\r\neach other and replicate successful attack methods.\r\nLiu advised users to turn off the USB debugging feature on their Android devices when not it’s not needed and to\r\nbe wary of connecting their mobile devices to computers they don’t trust.\r\nSource: https://www.computerworld.com/article/2486903/windows-malware-tries-to-infect-android-devices-connected-to-pcs.html\r\nhttps://www.computerworld.com/article/2486903/windows-malware-tries-to-infect-android-devices-connected-to-pcs.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.computerworld.com/article/2486903/windows-malware-tries-to-infect-android-devices-connected-to-pcs.html"
	],
	"report_names": [
		"windows-malware-tries-to-infect-android-devices-connected-to-pcs.html"
	],
	"threat_actors": [
		{
			"id": "75108fc1-7f6a-450e-b024-10284f3f62bb",
			"created_at": "2024-11-01T02:00:52.756877Z",
			"updated_at": "2026-04-10T02:00:05.273746Z",
			"deleted_at": null,
			"main_name": "Play",
			"aliases": null,
			"source_name": "MITRE:Play",
			"tools": [
				"Nltest",
				"AdFind",
				"PsExec",
				"Wevtutil",
				"Cobalt Strike",
				"Playcrypt",
				"Mimikatz"
			],
			"source_id": "MITRE",
			"reports": null
		}
	],
	"ts_created_at": 1775434389,
	"ts_updated_at": 1775791833,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/fa5e25d5296d92b4b3a0c9f8d2d96e6bf709f068.pdf",
		"text": "https://archive.orkl.eu/fa5e25d5296d92b4b3a0c9f8d2d96e6bf709f068.txt",
		"img": "https://archive.orkl.eu/fa5e25d5296d92b4b3a0c9f8d2d96e6bf709f068.jpg"
	}
}