Krysanec infects Android devices by masquerading as legitimate applications, and even displays dubious credentials of its creators, to trick Android smartphone users into downloading the application, post which the Trojan opens backdoors for hackers to remotely gain access to user data.
Once on a host device, Krysanec allows its creators to add extra functionality in the form of additional plug-in modules that can potentially upgrade the existing basic malware capabilities of Krysanec.
The additional plug-ins, once executed and installed within the infected Android device, could allow the hackers to record audio via the device’s microphone, tap into the user’s text messages or contacts list, send text messages and even detect the user’s location with the help of the host Android device’s GPS functionality.
Every day we send out a free e-mail with the most important headlines of the last 24 hours.
Subscribe now
We welcome comments that add value to the discussion. We attempt to block comments that use offensive language or appear to be spam, and our editors frequently review the comments to ensure they are appropriate. If you see a comment that you believe is inappropriate to the discussion, you can bring it to our attention by using the report abuse links. As the comments are written and submitted by visitors of the The Paypers website, they in no way represent the opinion of The Paypers.