Earlier Trojans have been capable of logging call details, but this is the first one seen that can actually make a complete recording of the conversation.
After the malware finds itself onto a Android handset, it asks for a whole bunch of permissions - which should raise a number of red flags.
Once the malware is given the required permissions by the user, it installs a configuration file that contains remote server access information.
Now it’s ready to start recording conversations, which are stored on the microSD card in .AMR files.
Best defense against this sort of malware is to pay attention to the permissions that the app is asking for. Ask yourself - does this app really need all these capabilities? If in doubt, say no!