My antivirus shows a virus in the clockwork mod but I am not sure whether it is a virus or a program to root the phone. Kindly help whether I delete it or keep it. The name of the file is shown as [email protected] Is it a part of clock word mod or is it actually a malware.
There is no such thing as viruses in ClockworkMod, that's just a false positive, an infection is impossible. Moreoever Android uses Sandboxing and that also means that anti-virus apps are largely useless for protection (except for anti theft) since they don't have access to the low level system resources, so they cannot protect anything. They can't even access anything from another running App. At most they compare your list of installed Apps with their online database.
What Antivirus App did you use?
I'm going through the same :/
AW: [Q] virus in clockwork mod
JavyerS3 said:
I'm going through the same :/
Click to expand...
Click to collapse
Cwm is open source and you could convince yourself with a look at the source. It's just failed alarm.
Maybe you are using windows and it doesn't understand the .IMG ending.
zaded said:
My antivirus shows a virus in the clockwork mod but I am not sure whether it is a virus or a program to root the phone. Kindly help whether I delete it or keep it. The name of the file is shown as [email protected] Is it a part of clock word mod or is it actually a malware.
Click to expand...
Click to collapse
false positive!
Related
Forgive my ignorance, but ive never used android before and expecting my phone delivered tomorrow (htc hero! )
As i understand it, the android app store signs the apps similar to iphones itunes store to prevent piracy and malware.
Is this correct?
Ive read about how one can "root" the device by loading a image file thru the bootloader over usb, but i wonder, is there a sudo command or similar to temporarily enable root access and later return to default state?
I suppose i could flash it with the root image, install the app and then flash back the default os image, but that feels pretty awkward procedure and would probably raise a bunch of new problems as how the default os would launch the app installed under another os.
I was hoping to start tinkering with programming, but im unsure if i can "throw in the app" and expect it to work..?
After using mac´s for over 20 years ive become too used to stuff just working right out of the box, so i dont feel like experimenting on my own...
There is an option in the settings that lets you install unsigned apps, so no rooting required.
xarvox said:
As i understand it, the android app store signs the apps similar to iphones itunes store to prevent piracy and malware.
Is this correct?
Click to expand...
Click to collapse
Not exactly! Many paid apps are copy protected, but most of the free ones are not. Unlike the iPhone, where you can only install "unauthorized" apps if you jail break the device, Android allows you to install and run applications from a variety of sources on a stock device.
In essence, you do not need to root the device to develop for it, but there are certain things that applications can only be done on a rooted device (for example, receiving a file via Bluetooth, WiFi tethering etc).
I was hoping to start tinkering with programming, but im unsure if i can "throw in the app" and expect it to work..?
Click to expand...
Click to collapse
Well, programming errors aside ( ), and as long as you don't need to do anything that requires root privileges, yes you can. You should bear in mind that the *vast* majority of Android devices will not have been rooted, and therefore the vast majority of available applications do not require rooted phones.
Personally, I expect that later Android builds will remove many of the restrictions that require applications to have root access, so that they can function without requiring a device to be rooted.
Regards,
Dave
Ive found a app that would tether my laptop (mac) over wifi, but requires me to root the device.
Is there a way to temporarily do this, install the app and make the neccisary changes and then switch back to default state?
I don't believe so.
As far as I'm aware, the application requires the elevated privileges when it runs as opposed to just configuration changes. I don't think that even a setuid would help, since I believe the app expects to find and use su/sudo.
Regards,
Dave
Is there any site or source on the web that provides downloads of old versions of Android Market apps? This would be for apps that are now updated or no longer available on the Market? I am looking for a site similar to "OldVersion.com" which has some old/classic PC software (but this would be something for android apps instead)?
Thanks if anyone knows of a source or sites.
CustomShortcut gone?
The app that I am looking for in the above post was a free one called CustomShortcut APK. I now have it on one of my two phones (the other phone had it but was lost and replaced). I have tried looking for a developer page for this app but no luck as everything seems to point back to android market as the source link for download.
Does anyone know of a way or source for me to get this APK back on my other phone? Is there a way to copy it from one phone to the other? I am assuming that it was removed from the market because it may not be compatible with ICS but I am not running ICS. The application was made by appli.club.
Are you rooted? If so use root explorer to look for the .apk in the /system/app folder and copy or email it to the other phone and install it.
85gallon said:
Are you rooted? If so use root explorer to look for the .apk in the /system/app folder and copy or email it to the other phone and install it.
Click to expand...
Click to collapse
No sadly I am not rooted. Is that how this could be done? I have an HTC phone (Sensation) and I like my "sense" gui. Don't want to wipe it out by rooting (that is what would happen, right?) If access to the apk is possible with rooting, then I guess my question would be, does anyone else here have CustomCut on their rooted phone? (Or possibly know of any website that would have those apk's available for download). I would be willing to pay if someone would take the time to send me a replacement copy.
just google for any app you want like this:
"title" "versionnumber" "apk" "download"
for example:
android market 2.9 apk download
mojosingle said:
No sadly I am not rooted. Is that how this could be done? I have an HTC phone (Sensation) and I like my "sense" gui. Don't want to wipe it out by rooting (that is what would happen, right?) If access to the apk is possible with rooting, then I guess my question would be, does anyone else here have CustomCut on their rooted phone? (Or possibly know of any website that would have those apk's available for download). I would be willing to pay if someone would take the time to send me a replacement copy.
Click to expand...
Click to collapse
Rooting will not wipe out your phone or change it other than giving you super user privileges. That way you will have access to get to the system apps folder.
I notice apktop keeps old versions around. But part of the reason I like Titanium backup is because I have a fail safe if a new update to an app is bad, as I can just restore from the last backup the older version.
85gallon said:
Rooting will not wipe out your phone or change it other than giving you super user privileges. That way you will have access to get to the system apps folder.
Click to expand...
Click to collapse
Well I am not really too concerned about it wiping out my phone, but I thought I had read many posts here talking about once you root your phone the native skin from the manufacturer is eliminated (for HTC that would be the "Sense" user interface). Can you please confirm? Is this not true? HTC Sense will remain exactly the same after rooting my phone?
The other thing that has made me cautious is that my phone runs perfectly now and I see so many threads on the xda boards here and over at various android forums that start off with "My ____ app is not working right since I rooted...." Just a little daunting for a newbie like myself.
spunker88 said:
I notice apktop keeps old versions around. But part of the reason I like Titanium backup is because I have a fail safe if a new update to an app is bad, as I can just restore from the last backup the older version.
Click to expand...
Click to collapse
Thanks very much for the site suggestion. I have been trying to search for the CustomShortcut APK over there but no luck ...so far (the site search is not that easy to use). I have even tried to seach the site externally using google but, unfortunately, still no luck.
Wait for someone else to confirm on the htc, but nothing changed on my droidx. I just had superuser privs. All of the "this app quit working" is when people flash custom roms. You don't do that when you just root. But you have to be rooted in order to do things like that. Lol.
Rooting gives you the power to do that if you want to.
When I rooted my droidx, I did it just so I could have the power to do other things if I wanted. I am still on factory rom. But I am able to get to parts of the phone that are off limits if I wasnt rooted. I made it where I could tether, later I got rid of bloatware, etc.
85gallon said:
Wait for someone else to confirm on the htc, but nothing changed on my droidx. I just had superuser privs. All of the "this app quit working" is when people flash custom roms. You don't do that when you just root. But you have to be rooted in order to do things like that. Lol.
Rooting gives you the power to do that if you want to.
When I rooted my droidx, I did it just so I could have the power to do other things if I wanted. I am still on factory rom. But I am able to get to parts of the phone that are off limits if I wasnt rooted. I made it where I could tether, later I got rid of bloatware, etc.
Click to expand...
Click to collapse
Thanks once again for the reply. Now that you mention it, I remember reading the terminology "flashed" rom and thought they were similar or the same thing as rooting. One other question, once a phone is in a rooted state, if I was to go in and copy the APK for my replacement phone and put it on there could I then "unroot" lol ...sorry if this is not a word... so that my phone was no longer open? I had read somewhere (perhaps I heard it on a TWIT or Android podcast) that when your phone is in root state that anyone (ie: potentially bad software) has easier access to your phone's vunerable areas.
mojosingle said:
Thanks once again for the reply. Now that you mention it, I remember reading the terminology "flashed" rom and thought they were similar or the same thing as rooting. One other question, once a phone is in a rooted state, if I was to go in and copy the APK for my replacement phone and put it on there could I then "unroot" lol ...sorry if this is not a word... so that my phone was no longer open? I had read somewhere (perhaps I heard it on a TWIT or Android podcast) that when your phone is in root state that anyone (ie: potentially bad software) has easier access to your phone's vunerable areas.
Click to expand...
Click to collapse
yes you can unroot. As for easy access after you are rooted to vulnerable areas, they can only get access if you let them. If an app wants super user privileges, you will get a pop up from su(the super user apk) telling you that some app is wanting privileges. You can grant or deny access. The only things on my phone that have ever given me a pop up are things that i downloaded and know need su access. Wifi tether, root explorer, adfree, etc.
I have found a site that keeps older version of an android app. It's called Android Drawer.
Hope it helps
Hi,
So I was always under the impression that rooting is more dangerous because it lets applications more access to the system and let it perform more actions. However, now that I think about it can't this be handeled by a program that limits permissions?
Or do apps in a rooted phone behave differently than in an unrooted one (ie.can do actions not included in the permission system)?
What about an unrooted phone?
If I install a spyware what information can't it gather that it can on a rooted?
Thank you very much!
oy-ster said:
Hi,
So I was always under the impression that rooting is more dangerous because it lets applications more access to the system and let it perform more actions. However, now that I think about it can't this be handeled by a program that limits permissions?
Or do apps in a rooted phone behave differently than in an unrooted one (ie.can do actions not included in the permission system)?
What about an unrooted phone?
If I install a spyware what information can't it gather that it can on a rooted?
Thank you very much!
Click to expand...
Click to collapse
http://www.lockergnome.com/android/2013/01/25/how-safe-is-rooting-android-devices/
http://google.about.com/od/socialtoolsfromgoogle/a/root-android-decision.htm
http://www.bullguard.com/bullguard-...ity/mobile-threats/android-rooting-risks.aspx
Thank you for the links, I have alredy enconutered some of them previously (I usually Google before posting ) and they are part of my confusion.
On one hand: http://www.bullguard.com/bullguard-...ity/mobile-threats/android-rooting-risks.aspx says about apps with root access circumvent the security system, on the other: http://google.about.com/od/socialtoolsfromgoogle/a/root-android-decision.htm notes that you can control this access, so why does first warning exists?
Also, do superuser apps can detect every element and limit it accessability? For example, what about malicious code that I recieve from clicking on some pernicious link?
PS. When one of the pages said: "A common practice that people do with "rooted" phones is to flash their ROM's with custom programs." - it meant custom OS/ROM or did it mean the program you are using in order to perform flashing?
Thank you.
upity up.
Can there be malware files other than apk ?
I mean in phone, only apk can do hacking like taking video without user knowing.
But would there be other exe files that can run and hack??
What if i install custom ROM not based on android linux?
Then other files can run and hack?
if malware is in kernel , then can it use camera in my phone? I mean malware in kernel would be not in the form of apk i guess. But can it still access to my camera?
if they can, i heard 2 programs cant use camera at sametime. Then when malware in kernel is using camera, if i click camera app, one of malware in kernel and me will lose access to camera?
What OS version?
blackhawk said:
What OS version?
Click to expand...
Click to collapse
Lolipop-marshmallow
Jenjenjney said:
Lolipop-marshmallow
Click to expand...
Click to collapse
Anything below Android 9 is vulnerable to partition worming rootkits like X-helper. A full reflash should be done if a factory reset doesn't get it. Rootkits are the worst of the worst and can do exponential damage. It must be eliminated... zero tolerance. Scan with Malwarebytes if you haven't already... it might find some of it.
Change passwords once it's eliminated. Be careful what you install and download in the future. Scan any sideliaded apps first with online Virustotal, if there's any question of security with an app, don't install it. You are what you load.
Use only cloud based email like Gmail.
If you continue to use that OS version you'll want to lock it down more. Install Karma Firewall and block everything that doesn't need internet access to function ie browsers. Paid apps block once activated.
Redmi 4x satoni(not rooted or flashed)
Is there any way to detect root by exploit, apps like Kingo root and king root and many other one click root apps do this kind of thing where they use and exploit in the Android system and root the phone using it and similarly a malware can do the same?
(I'm assuming this is what it is)(spear phishing)
Can an apk file really gain root access and rewrite your device's rom with a malware in it, is that a thing?
I have installed a third party app where it just disappeared into the background(most likely social engineering) and I tried all avs but it came clean even went into safe mode and settings and tried app managers and settings but all failed
Next I tried the factory reset and the symptoms still persists
Note that I have created new accounts and changed passwords and have MFA on but is there any way for it to reinfect because I'm using the same device to create the new account?
Like is it because it infected my google access or something to come again after factory reset
Thanks
If you think a girlfriend virus is bad, just wait until you get married.
To answer your question....
Android is designed to be very rootkit-resistant. Features such as Verified Boot prevent unsigned/modified images from loading if the bootloader is locked; while it is possible for a malicious app to use an unpatched exploit to root the device every time it runs, any modificaiton made to any critical partiion such as /boot and /system would be detected, and the device would warn the user that the system is corrupted.
Since you've removed the app from your device and performed a factory reset, you should be safe. Good job on using MFA, by the way.
V0latyle said:
If you think a girlfriend virus is bad, just wait until you get married.
To answer your question....
Android is designed to be very rootkit-resistant. Features such as Verified Boot prevent unsigned/modified images from loading if the bootloader is locked; while it is possible for a malicious app to use an unpatched exploit to root the device every time it runs, any modificaiton made to any critical partiion such as /boot and /system would be detected, and the device would warn the user that the system is corrupted.
Since you've removed the app from your device and performed a factory reset, you should be safe. Good job on using MFA, by the way.
V0latyle said:
If you think a girlfriend virus is bad, just wait until you get married.
To answer your question....
Android is designed to be very rootkit-resistant. Features such as Verified Boot prevent unsigned/modified images from loading if the bootloader is locked; while it is possible for a malicious app to use an unpatched exploit to root the device every time it runs, any modificaiton made to any critical partiion such as /boot and /system would be detected, and the device would warn the user that the system is corrupted.
Since you've removed the app from your device and performed a factory reset, you should be safe. Good job on using MFA, by the way.
Click to expand...
Click to collapse
Click to expand...
Click to collapse
No I think I misunderstood there were two apps that I downloaded one disappeared into the back ground (which is causing more havoc) and is undetectable by android avs and i m having trouble removing(got from a sketchy link from my gf)
The second app was just an Instagram app follower which ran in the background and I could uninstall directly(got from playstore)
I want to know how to detect and remove the first one
alokmfmf said:
got from a sketchy link from my gf
Click to expand...
Click to collapse
That's why one should always use protection.
alokmfmf said:
The second app was just an Instagram app follower which ran in the background and I could uninstall directly(got from playstore)
I want to know how to detect and remove the first one
Click to expand...
Click to collapse
What makes you think the first app is still there? If you've performed a factory reset, it's gone - unless it downloaded again when you restored your Google account to your device.
Are you sure you're not mistaking a built-in app?
alokmfmf said:
Is there any way to detect root
Click to expand...
Click to collapse
Yes, almost every banking / payment app does it.
V0latyle said:
That's why one should always use protection.
What makes you think the first app is still there? If you've performed a factory reset, it's gone - unless it downloaded again when you restored your Google account to your device.
Are you sure you're not mistaking a built-in app?
Click to expand...
Click to collapse
Yes I'm sure as my accounts getting hacked my personal media getting leaked permissions asked repeatedly and sim getting disabled
Also I'm trying not to log in to my google account and see how that works
Although I have tried to make new accounts from scatch and start from a clean new slate from factory reset it it may be the device itself I'm afraid
Social engineering-spear phishing(I think)
Redmi4x satoni
I was asked to click on a link and download an apk by my girlfriend and as soon as I downloaded it, it disappeared and I was asked to delete the apk
(I do not have access to the link also)
Later I realized that it tracks permissions, media and keyboard(except of exactly who I'm texting to because of android sandbox)
I tried FACTORY RESET but the symptoms still persisted (like getting hacked again and my private info getting leaked,sim deduction and detection of sim card and permissions being asked again and again even though I allowed it)
I checked all the settings of my phone and nothing is abnormal(I'm not rooted)
Is it possible that a used account could somehow transmit virus because I had a nasty malware on my phone so I factory reset my phone but the symptoms still remain so I used a new google account and others also but it still comes back so I'm guessing its the kernel or the ROM that got infected
I tried all avs but they all came clean and I'm certain that my android is infected with something
First and foremost I need to know how to DETECT the malware (to know which app is causing this)
And second how to REMOVE the malware
Thanks.
Which OS version? If not running on Pie or higher it's suspectable to the Xhelper family of partition worming malware
Yeah sounds like you got a worm... nasty critters.
A reflash may be the best option although if it is Xhelper it can now be removed without a reflash.
You are what you load
blackhawk said:
Which OS version? If not running on Pie or higher it's suspectable to the Xhelper family of partition worming malware
Yeah sounds like you got a worm... nasty critters.
A reflash may be the best option although if it is Xhelper it can now be removed without a reflash.
You are what you load
Click to expand...
Click to collapse
Yes I know I made a stupid decision its completely my fault I tried using the xhelper method but it comes clean I assume there is only one method that involves disabling the play store
I run on miui 11 nougat 7
Any methods to detect and remove the malware are welcome
And about reflashing its very complicated for mi phones most
alokmfmf said:
I run on miui 11 nougat 7
Any methods to detect and remove the malware are welcome
And about reflashing its very complicated for mi phones most
Click to expand...
Click to collapse
Reflash it to stock firmware. If you can upgrade to Android 9 consider doing so for security purposes. It may have performance/functionality drawbacks though for your application though, not sure as I never used 6,7 or 8.
Make sure you reset all passwords, keep social media, sales and trash apps off the phone. Always keep email in the cloud ie Gmail or such.
Run Karma Firewall. Be careful what you download and especially install... don't sample apps unless you have a real need for that particular app. Once installed don't allow apps to update as they may try to download their malware payload, a way to bypass Playstore security.
blackhawk said:
Reflash it to stock firmware. If you can upgrade to Android 9 consider doing so for security purposes. It may have performance/functionality drawbacks though for your application though, not sure as I never used 6,7 or 8.
Make sure you reset all passwords, keep social media, sales and trash apps off the phone. Always keep email in the cloud ie Gmail or such.
Run Karma Firewall. Be careful what you download and especially install... don't sample apps unless you have a real need for that particular app. Once installed don't allow apps to update as they may try to download their malware payload, a way to bypass Playstore security.
Click to expand...
Click to collapse
Will not logging in my google account help
alokmfmf said:
Will not logging in my google account help
Click to expand...
Click to collapse
No. The malware is in the phone apparently in the firmware.
blackhawk said:
No. The malware is in the phone apparently in the firmware.
Click to expand...
Click to collapse
I disagree, unless Xiaomi/Redmi's AVB/dm-verity implementation is useless, it should prevent a persistent rootkit.
I suspect this has little to do with the phone and more to do with reused passwords and other "organic" security failure.
V0latyle said:
I disagree, unless Xiaomi/Redmi's AVB/dm-verity implementation is useless, it should prevent a persistent rootkit.
I suspect this has little to do with the phone and more to do with reused passwords and other "organic" security failure.
Click to expand...
Click to collapse
You're probably right. Forgot it was running 11... lol, organic security failure, I like that
blackhawk said:
You're probably right. Forgot it was running 11... lol, organic security failure, I like that
Click to expand...
Click to collapse
The security measures that prevent persistent rootkits have been in place long before Android 11.
The most common root cause of a breach of security is the failure to ensure sufficient security in the first place. Simple passwords, reused passwords, no MFA, connected accounts, etc. Yes, there are plenty of Android viruses out there, but all of them "live" in the user data space. Of course, there may be unpatched exploits that allow root access, but these must be exploited every time the app is run. An app cannot modify the boot or system partitions without tripping AVB (if the bootloader is locked) whereupon the device would warn that the OS is corrupted.
At the end of the day, it's much much easier to simply use social engineering or other methods to gain someone's credentials, rather than trying to hack their device.
V0latyle said:
The security measures that prevent persistent rootkits have been in place long before Android 11.
Click to expand...
Click to collapse
Yeah Android 9 was where the hole for the Xhelper class of rootkits was plugged for good. It runs securely unless you do stupid things. This phone is running on that and its current load will be 3 yo in June. No malware in all that time in spite of the fact it's heavily used. It can be very resistant to attacks if set up and used correctly.
V0latyle said:
The most common root cause of a breach of security is the failure to ensure sufficient security in the first place. Simple passwords, reused passwords, no MFA, connected accounts, etc. Yes, there are plenty of Android viruses out there, but all of them "live" in the user data space. Of course, there may be unpatched exploits that allow root access, but these must be exploited every time the app is run. An app cannot modify the boot or system partitions without tripping AVB (if the bootloader is locked) whereupon the device would warn that the OS is corrupted.
Click to expand...
Click to collapse
I was initially thinking his was running on Android 8 or lower. Forgot On Android 9 and higher (except for a big hole in Android 11 and 12 that was patched if memory serves me correctly) about the only way malware is getting into the user data partition is if the user installs it, doesn't use appropriate builtin settings safeguards or by an infected USB device. Any phone can be hacked if the attacker is sophisticated and determined enough to do so... in my opinion. Even if this happens a factory reset will purge it on a stock phone unless the hacker has access to the firmware by remote or physical access. Never allow remote access to anyone...
V0latyle said:
At the end of the day, it's much much easier to simply use social engineering or other methods to gain someone's credentials, rather than trying to hack their device.
Click to expand...
Click to collapse
Lol, that's what social media is for
blackhawk said:
No. The malware is in the phone apparently in the firmware.
Click to expand...
Click to collapse
OK thanks for helping its been good
alokmfmf said:
OK thanks for helping its been good
Click to expand...
Click to collapse
You're welcome.
I retract that (post #12) as I forgot it is running on Android 11. Like V0latyl said it's probably the password(s) that were compromised if a factory reset didn't resolve the issue other than the exceptions I stated in post #16.
Also i found this on the net if that helps with the situation
Be especially wary of spear phishing. Do not click on any weird link sent by your closest friends, or if you feel compelled to do so, open it from a tightly secured operating system (a fresh VM) where you have never logged in to your social networks.
And
Factory resets are not enough to santitize the device.
Also I'm a bit scared as some people on the net have told that in some cases that even a flash might not wipe it as it resides in the boot logo or some places where flashes do not reach or in flash ROMs chips(but of course this is all very rare)
I am very fascinated and would like to learn more about it any suggestions would be helpful