Investigasi Serangan Backdoor Remote Access Trojan (RAT) Terhadap Smartphone

Authors

  • M. Alvian H Nasution Universitas Amikom Yogyakarta, Sleman
  • Agung Tri Laksono Universitas Amikom Yogyakarta, Sleman

DOI:

https://doi.org/10.30865/jurikom.v7i4.2301

Keywords:

RAT, Malware, Android, Smartphone, Information

Abstract

The Smartphone is one of the needs for everyone at this time, especially in terms of communication with others, but with the development of technology that is also increasingly sophisticated, sometimes we as users do not know there are crimes or attacks that can occur to our smartphone and threaten personal information or data self that is in it, especially android users, where on Android devices can be inserted a malware with the type of RAT or often we call the Remote Access Trojan which is deliberately made using ngrok tools, where the RAT can be made using various file extensions such as. jpg,. MP4, or .apk as was done and will be discussed in this journal. In this journal, an experiment will also be carried out planting RATs on a target, namely an android smartphone which will finally get full access from the smartphone to get full access to any directory that exists shortly after the installation of the RAT hidden in the .apk form file, besides that with this test it is expected that smartphone users, especially Android users, do not root privately, because by rooting the device can open a security hole of the device that we are using and it will be easier to attack from irresponsible parties

Author Biographies

M. Alvian H Nasution, Universitas Amikom Yogyakarta, Sleman

Fakultas Ilmu Komputer, Program Studi Teknik Komputer

Agung Tri Laksono, Universitas Amikom Yogyakarta, Sleman

Fakultas Ilmu Komputer, Program Studi Teknik Komputer

References

D. R. Septiani, N. Widiyasono, and H. Mubarok, “Investigasi Serangan Malware Njrat Pada PC,†J. Edukasi dan Penelit. Inform., vol. 2, no. 2, pp. 123–128, 2016, doi: 10.26418/jp.v2i2.16736.

R. Novrianda, Y. N. Kunang, and P. . Shaksono, “Analisis Forensik Pada Platform Android,†Konf. Nas. ilmu Komput., pp. 141–148, 2014.

A. Kartono, A. Sularsa, and S. J. I. Ismail, “Membangun Sistem Pengujian Keamanan Aplikasi Android Menggunakan Mobsf,†vol. 5, no. 1, pp. 146–151, 2019.

N. Setiawan, “Kasus kejahatan siber pada telepon seluler android,†CyberSecurity dan Forensik Digit., vol. 2, no. 1, pp. 24–29, 2019.

Y. A. Utomo et al., “Membangun Sistem Analisis Malware Pada Aplikasi Android Dengan Metode Reverse Engineering Menggunakan Remnux,†vol. 4, no. 3, pp. 2000–2012, 2018.

H. Abualola, H. Alhawai, M. Kadadha, H. Otrok, and A. Mourad, “An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability,†Procedia Computer Science, vol. 83. pp. 465–471, 2016, doi: 10.1016/j.procs.2016.04.210.

A. S. Rusdi, N. Widiyasono, and H. Sulastri, “Analisis Infeksi Malware Pada Perangkat Android Dengan Metode Hybrid Analysis,†no. 24, 2019.

W. C. Hsieh, C. C. Wu, and Y. W. Kao, “A study of android malware detection technology evolution,†Proc. - Int. Carnahan Conf. Secur. Technol., vol. 2015-January, pp. 135–140, 2016, doi: 10.1109/CCST.2015.7389671.

T. A. Cahyanto, V. Wahanggara, and D. Ramadana, “Analisis dan Deteksi Malware Menggunakan Metode Malware Analisis Dinamis dan Malware Analisis Statis,†Justindo, J. Sist. Teknol. Inf. Indones., vol. 2, no. 1, pp. 19–30, 2017.

E. J. Victorius, A. Budiyono, A. Almaarif, and S. Kom, “Analisis Deteksi Malware Remote Access Trojan Menggunakan Dynamic Malware Analysis Detection Tools Berbasis Behaviour Malware Detection Analysis of Remote Access Trojan With Behaviour-Based Dynamic Malware Analysis Detection Tools,†vol. 6, no. 2, pp. 7804–7811, 2019.

A. F. Muhtadi and A. Almaarif, “Analysis of Malware Impact on Network Traffic using Behavior-based Detection Technique,†Int. J. Adv. Data Inf. Syst., vol. 1, no. 1, pp. 17–25, 2020, doi: 10.25008/ijadis.v1i1.14.

Additional Files

Published

2020-08-31

How to Cite

Nasution, M. A. H., & Laksono, A. T. (2020). Investigasi Serangan Backdoor Remote Access Trojan (RAT) Terhadap Smartphone. JURNAL RISET KOMPUTER (JURIKOM), 7(4), 505–510. https://doi.org/10.30865/jurikom.v7i4.2301