Mutated Android Trojan spotted in the wild

Kapersky Lab has positively identified a third variant of the FakePlayer SMS Trojan targeted at Android devices.

According to Kapersky’s Denis Maslennikov, the latest iteration of the Trojan sends for-fee SMS/text messages to two short numbers: 7132 and 4161.

The cost for every SMS/text message remains a rather hefty $6, approximately 170 Russian rubles.

The current FakePlayer variant also features a “porno player” icon that was present in the first strain of the Trojan.

“There are no other changes. The same archive – pornplayer.apk, the same infection vector – via the Internet using SEO tricks and the same queries upon installation. So no real changes – just a new variant to earn additional money,” Maslennikov confirmed.

“[Still], everyone with a phone which supports J2ME should also beware: if you go to a website which is spreading Trojan-SMS.AndroidOS.FakePlayer.c using a mobile web browser, such as Opera Mini for instance, you will be offered a link to download a J2ME application – which happens to be a Trojan we detect as Trojan.SMS.J2ME.Small.r…”