Reply to post:

Say hello to Dvmap: The first Android malware with code injection


There is malware that jumps VM's and fu*&ing air-gaps... This ain't $h1t.

Charles 9 is correct. It will use an exploit, usually dirtycow, to temp root for that instance only. It will lock up the device after it does its bidding via kernel panic or OOM event forcing the user to restart the device, thereby effectivly erasing the root yet leaving the code nestled between your /system files and your /data files... Both need root to write to. Anyway that is what I heard from SWIM....

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon