Google recently began remote wiping Android devices infected with malware after discovering more than 50 malicious applications in the official Android Market.
If something has root access to your device, it means the software could potentially take control of the entire device and any data stored on it.
Mobile security firm Lookout isn’t sure what DroidDream was designed to do once it gained access to your phone, but the company said the possibilities were “limitless.” DroidDream had been discovered in third-party app stores before, but this was the first time it had popped up in the official Android Market.
With Google starting to remove the malware from infected devices and promising to beef up security for the Android Market, it appears the DroidDream threat will be limited. Nevertheless, if you’ve got an Android device and are worried you might be infected, here’s what you need to know.
Which applications were loaded with DroidDream?
Have the malicious apps been removed from the Android Market?
Google said late Tuesday that all DroidDream-infected apps were removed from the Market.
I am infected. When can I expect Google to wipe the apps?
Google said anyone with an infected device could expect to hear from android-market-support@google.com by the evening of Tuesday, March 8. The search giant will also install a new security update on your device called “Android Market Security Tool March 2011.” The update will automatically undo the exploit.
Wait a second — Google can remotely wipe data from my device?
Yes, and it’s not the first time the company has done this. In June, the company wiped two applications from user’s phones that were built by a security researcher. Google said it removed the apps, because the apps “intentionally misrepresented their purpose in order to encourage user downloads.”
Google says its ability to remote wipe devices is “one of many security controls the Android team can use to help protect users from malicious applications.”
What could attackers do with an infected phone?
It’s not clear what the DroidDream attackers planned to do with the infected phones, but with root access the attackers could have downloaded more malicious software to your handset or attempted to pull more personal data from your device.
What exactly did DroidDream do?
DroidDream was embedded within more than 50 Android apps, and would gain root access to your Android device after you ran the app for the first time. It would then install a second application, which required special permission to uninstall. After that, an exploited phone could have more malicious apps installed on it and send more of your data to the DroidDream attackers.
Interestingly, DroidDream was designed to do most of its dirty work between 11 p.m. and 8 a.m. when most people would be sleeping and the phone was less likely to be in use. This made it harder for you to detect abnormal behavior with your device. For a complete breakdown of how DroidDream worked, check out this post on Lookout’s blog.
What is Google doing to secure the Android Market?
Google said it is adding “a number of measures to help prevent additional malicious applications using similar exploits from being distributed through Android Market.”
The company didn’t specify what those measures were. It’s not clear if Google intends to vet applications prior to the app’s introduction into the Android Market, similar to what Apple does for iPhone and iPad applications.
Connect with Ian Paul (@ianpaul) and Today@PCWorld on Twitter for the latest tech news and analysis.