ARTICLES  HOME  OS() Android(25) Apple(26) OS Articles - H 2020 1  2  3 


H  AI(1) APT(24) Attack(15) BigBrothers(53) BotNet(9) Crime(17) Cryptocurrency(22) Cyber(3) Exploit(23) Hacking(17) ICS(3) Incindent(10) IoT(1) Mobil(0) OS(1) Phishing(6) Ransom(32) Safety(1) Security(17) Social(7) Spam(0) Virus(107) Vulnerebility(93)


New 5G Modem Flaws Affect iOS Devices and Android Models from Major Brands

CATEGORIE : OS

DATE: 9.12.23

WEB : The Hacker News

A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as MediaTek and Qualcomm impact USB and IoT modems as well as hundreds of smartphone models running Android and iOS.

Of the 14 flaws – collectively called 5Ghoul (a combination of "5G" and "Ghoul") – 10 affect 5G modems from the two companies, out of which three have been classified as high-severity vulnerabilities.

Microsoft to Phase Out NTLM in Favor of Kerberos for Stronger Authentication

CATEGORIE : OS

DATE: 14.10.23

WEB : The Hacker News

Microsoft has announced that it plans to eliminate NT LAN Manager (NTLM) in Windows 11 in the future, as it pivots to alternative methods for authentication and bolster security.

"The focus is on strengthening the Kerberos authentication protocol, which has been the default since 2000, and reducing reliance on NT LAN Manager (NTLM)," the tech giant said. "New features for Windows 11 include Initial and Pass Through Authentication Using Kerberos (IAKerb) and a local Key Distribution Center (KDC) for Kerberos."

Apple Rolls Out Security Patches for Actively Exploited iOS Zero-Day Flaw

CATEGORIE : Apple

DATE: 4.10.23

WEB : The Hacker News

Apple on Wednesday rolled out security patches to address a new zero-day flaw in iOS and iPadOS that it said has come under active exploitation in the wild.

Tracked as CVE-2023-42824, the kernel vulnerability could be abused by a local attacker to elevate their privileges. The iPhone maker said it addressed the problem with improved checks.

GoldDigger Android Trojan Targets Banking Apps in Asia Pacific Countries

CATEGORIE : Android

DATE: 4.10.23

WEB : The Hacker News

A new Android banking trojan named GoldDigger has been found targeting several financial applications with an aim to siphon victims' funds and backdoor infected devices.

"The malware targets more than 50 Vietnamese banking, e-wallet and crypto wallet applications," Group-IB said. "There are indications that this threat might be poised to extend its reach across the wider APAC region and to Spanish-speaking countries."

Researchers Link DragonEgg Android Spyware to LightSpy iOS Surveillanceware

CATEGORIE : Android

DATE: 4.10.23

WEB : The Hacker News

New findings have identified connections between an Android spyware called DragonEgg and another sophisticated modular iOS surveillanceware tool named LightSpy.

DragonEgg, alongside WyrmSpy (aka AndroidControl), was first disclosed by Lookout in July 2023 as a strain of malware capable of gathering sensitive data from Android devices. It was attributed to the Chinese nation-state group APT41.

Zanubis Android Banking Trojan Poses as Peruvian Government App to Target Users

CATEGORIE : Android

DATE: 2.10.23

WEB : The Hacker News

An emerging Android banking trojan called Zanubis is now masquerading as a Peruvian government app to trick unsuspecting users into installing the malware.

"Zanubis's main infection path is through impersonating legitimate Peruvian Android applications and then tricking the user into enabling the Accessibility permissions in order to take full control of the device," Kaspersky said in an analysis published last week.

New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware

Apple Zero-Day

CATEGORIE : Apple

DATE: 23.9.23

WEB : The Hacker News

The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain in an attempt to deliver a spyware strain called Predator targeting former Egyptian member of parliament Ahmed Eltantawy between May and September 2023.

 

Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable

Zero-Day

CATEGORIE : Apple

DATE: 22.9.23

WEB : The Hacker News

Apple has released yet another round of security patches to address three actively exploited zero-day flaws impacting iOS, iPadOS, macOS, watchOS, and Safari, taking the total tally of zero-day bugs discovered in its software this year to 16.

The list of security vulnerabilities is as follows -

Hook: New Android Banking Trojan That Expands on ERMAC's Legacy

Android Banking Trojan

CATEGORIE : Android

DATE: 18.9.23

WEB : The Hacker News

A new analysis of the Android banking trojan known as Hook has revealed that it's based on its predecessor called ERMAC.

"The ERMAC source code was used as a base for Hook," NCC Group security researchers Joshua Kamp and Alberto Segura said in a technical analysis published last week.

"All commands (30 in total) that the malware operator can send to a device infected with ERMAC malware, also exist in Hook. The code implementation for these commands is nearly identical."

Microsoft Uncovers Flaws in ncurses Library Affecting Linux and macOS Systems

Linux and macOS Systems

CATEGORIE : Apple

DATE: 15.9.23

WEB : The Hacker News

A set of memory corruption flaws have been discovered in the ncurses (short for new curses) programming library that could be exploited by threat actors to run malicious code on vulnerable Linux and macOS systems.

"Using environment variable poisoning, attackers could chain these vulnerabilities to elevate privileges and run code in the targeted program's context or perform other malicious actions," Microsoft Threat Intelligence researchers Jonathan Bar Or, Emanuele Cozzi, and Michael Pearse said in a technical report published today. The vulnerabilities, collectively tracked as CVE-2023-29491 (CVSS score of 7.8), have been addressed as of April 2023.

Millions Infected by Spyware Hidden in Fake Telegram Apps on Google Play

Fake Telegram Apps

CATEGORIE : Android

DATE: 9.9.23

WEB : The Hacker News

Spyware masquerading as modified versions of Telegram have been spotted in the Google Play Store that's designed to harvest sensitive information from compromised Android devices.

According to Kaspersky security researcher Igor Golovin, the apps come with nefarious features to capture and exfiltrate names, user IDs, contacts, phone numbers, and chat messages to an actor-controlled server.

The activity has been codenamed Evil Telegram by the Russian cybersecurity company.

Apple Rushes to Patch Zero-Day Flaws Exploited for Pegasus Spyware on iPhones

Patch Zero-Day Flaws

CATEGORIE : Apple

DATE: 8.9.23

WEB : The Hacker News

Apple on Thursday released emergency security updates for iOS, iPadOS, macOS, and watchOS to address two zero-day flaws that have been exploited in the wild to deliver NSO Group's Pegasus mercenary spyware.

The issues are described as below -

CVE-2023-41061 - A validation issue in Wallet that could result in arbitrary code execution when handling a maliciously crafted attachment.

Mac Users Beware: Malvertising Campaign Spreads Atomic Stealer macOS Malware

Atomic Stealer macOS Malware

CATEGORIE : Apple

DATE: 8.9.23

WEB : The Hacker News

A new malvertising campaign has been observed distributing an updated version of a macOS stealer malware called Atomic Stealer (or AMOS), indicating that it's being actively maintained by its author.

An off-the-shelf Golang malware available for $1,000 per month, Atomic Stealer first came to light in April 2023. Shortly after that, new variants with an expanded set of information-gathering features were detected in the wild, targeting gamers and cryptocurrency users. Malvertising via Google Ads has been observed as the primary distribution vector in which users searching for popular software, legitimate or cracked, on search engines are shown bogus ads that direct to websites hosting rogue installers.

Thousands of Android Malware Apps Using Stealthy APK Compression to Evade Detection

Android Malware Apps

CATEGORIE : Android

DATE: 19.8.23

WEB : The Hacker News

Threat actors are using Android Package (APK) files with unknown or unsupported compression methods to elude malware analysis.

That's according to findings from Zimperium, which found 3,300 artifacts leveraging such compression algorithms in the wild. 71 of the identified samples can be loaded on the operating system without any problems.

There is no evidence that the apps were available on the Google Play Store at any point in time, indicating that the apps were distributed through other means, typically via untrusted app stores or social engineering to trick the victims into sideloading them.

Gigabud RAT Android Banking Malware Targets Institutions Across Countries

Gigabud RAT Android Banking Malware

CATEGORIE : Android

DATE: 16.8.23

WEB : The Hacker News

Account holders of over numerous financial institutions in Thailand, Indonesia, Vietnam, the Philippines, and Peru are being targeted by an Android banking malware called Gigabud RAT.

"One of Gigabud RAT's unique features is that it doesn't execute any malicious actions until the user is authorized into the malicious application by a fraudster, [...] which makes it harder to detect," Group-IB researchers Pavel Naumov and Artem Grischenko said.

"Instead of using HTML overlay attacks, Gigabud RAT gathers sensitive information primarily through screen recording."

New Android 14 Security Feature: IT Admins Can Now Disable 2G Networks

Google Android 14

CATEGORIE : Android

DATE: 9.8.23

WEB : The Hacker News

Google has introduced a new security feature in Android 14 that allows IT administrators to disable support for 2G cellular networks in their managed device fleet.

The search giant said it's introducing a second user setting to turn off support, at the model level, for null-ciphered cellular connections.

Malicious Apps Use Sneaky Versioning Technique to Bypass Google Play Store Scanners

Google Play Store Scanners

CATEGORIE : Android

DATE: 3.8.23

WEB : The Hacker News

Threat actors are leveraging a technique called versioning to evade Google Play Store's malware detections and target Android users.

"Campaigns using versioning commonly target users' credentials, data, and finances," Google Cybersecurity Action Team (GCAT) said in its August 2023 Threat Horizons Report shared with The Hacker News.

While versioning is not a new phenomenon, it's sneaky and hard to detect. In this method, a developer releases an initial version of an app on the Play Store that passes Google's pre-publication checks, but is later updated with a malware component.

European Bank Customers Targeted in SpyNote Android Trojan Campaign

SpyNote Android Trojan

CATEGORIE : Android

DATE: 1.8.23

WEB : The Hacker News

Various European customers of different banks are being targeted by an Android banking trojan called SpyNote as part of an aggressive campaign detected in June and July 2023.

"The spyware is distributed through email phishing or smishing campaigns and the fraudulent activities are executed with a combination of remote access trojan (RAT) capabilities and vishing attack," Italian cybersecurity firm Cleafy said in a technical analysis released Monday. Apple Sets New Rules for Developers to Prevent Fingerprinting and Data Misuse

Apple App Development

CATEGORIE : Apple

DATE: 30.7.23

WEB : The Hacker News

Apple has announced plans to require developers to submit reasons to use certain APIs in their apps starting later this year with the release of iOS 17, iPadOS 17, macOS Sonoma, tvOS 17, and watchOS 10 to prevent their abuse for data collection.

"This will help ensure that apps only use these APIs for their intended purpose," the company said in a statement. "As part of this process, you'll need to select one or more approved reasons that accurately reflect how your app uses the API, and your app can only use the API for the reasons you've selected."

This Malware Turned Thousands of Hacked Windows and macOS PCs into Proxy Servers

Proxy Servers

CATEGORIE : Apple

DATE: 21.8.23

WEB : The Hacker News

Threat actors are leveraging access to malware-infected Windows and macOS machines to deliver a proxy server application and use them as exit nodes to reroute proxy requests.

According to AT&T Alien Labs, the unnamed company that offers the proxy service operates more than 400,000 proxy exit nodes, although it's not immediately clear how many of them were co-opted by malware installed on infected machines without user knowledge and interaction.

New Android Malware CherryBlos Utilizing OCR to Steal Sensitive Data

Android Malware CherryBlos

CATEGORIE : Android

DATE: 30.7.23

WEB : The Hacker News

A new Android malware strain called CherryBlos has been observed making use of optical character recognition (OCR) techniques to gather sensitive data stored in pictures.

CherryBlos, per Trend Micro, is distributed via bogus posts on social media platforms and comes with capabilities to steal cryptocurrency wallet-related credentials and act as a clipper to substitute wallet addresses when a victim copies a string matching a predefined format is copied to the clipboard.

Rust-based Realst Infostealer Targeting Apple macOS Users' Cryptocurrency Wallets

Infostealer

CATEGORIE : Apple

DATE: 26.7.23

WEB : The Hacker News

A new malware family called Realst has become the latest to target Apple macOS systems, with a third of the samples already designed to infect macOS 14 Sonoma, the upcoming major release of the operating system.

Written in the Rust programming language, the malware is distributed in the form of bogus blockchain games and is capable of "emptying crypto wallets and stealing stored password and browser data" from both Windows and macOS machines. Realst was first discovered in the wild by security researcher iamdeadlyz.

Apple Threatens to Pull iMessage and FaceTime from U.K. Amid Surveillance Demands

Apple App Store

CATEGORIE : Apple

DATE: 26.7.23

WEB : The Hacker News

Apple has warned that it would rather stop offering iMessage and FaceTime services in the U.K. than bowing down to government pressure in response to new proposals that seek to expand digital surveillance powers available to state intelligence agencies.

The development, first reported by BBC News, makes the iPhone maker the latest to join the chorus of voices protesting against forthcoming legislative changes to the Investigatory Powers Act (IPA) 2016 in a manner that would effectively render encryption protections ineffective.

Apple Issues Urgent Patch for Zero-Day Flaw Targeting iOS, iPadOS, macOS, and Safari

Apple App Store

CATEGORIE : Apple

DATE: 26.7.23

WEB : The Hacker News

Apple has released Rapid Security Response updates for iOS, iPadOS, macOS, and Safari web browser to address a zero-day flaw that it said has been actively exploited in the wild.

The WebKit bug, cataloged as CVE-2023-37450, could allow threat actors to achieve arbitrary code execution when processing speciall y crafted web content. The iPhone maker said it addressed the issue with improved checks.

Iranian Hackers' Sophisticated Malware Targets Windows and macOS Users

Iranian hackers

CATEGORIE : Apple

DATE: 26.7.23

WEB : The Hacker News

The Iranian nation-state actor known as TA453 has been linked to a new set of spear-phishing attacks that infect both Windows and macOS operating systems with malware.

"TA453 eventually used a variety of cloud hosting providers to deliver a novel infection chain that deploys the newly identified PowerShell backdoor GorjolEcho," Proofpoint said in a new report.

Hackers Using Golang Variant of Cobalt Strike to Target Apple macOS Systems

Cobalt Strike

CATEGORIE : Apple

DATE: 26.7.23

WEB : The Hacker News

A Golang implementation of Cobalt Strike called Geacon is likely to garner the attention of threat actors looking to target Apple macOS systems.

The findings come from SentinelOne, which observed an uptick in the number of Geacon payloads appearing on VirusTotal in recent months.

Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass

Apple macOS Vulnerability

CATEGORIE : Apple

DATE: 26.7.23

WEB : The Hacker News

Microsoft has shared details of a now-patched flaw in Apple macOS that could be abused by threat actors with root access to bypass security enforcements and perform arbitrary actions on affected devices.

Specifically, the flaw – dubbed Migraine and tracked as CVE-2023-32369 – could be abused to get around a key security measure called System Integrity Protection (SIP), or "rootless," which limits the actions the root user can perform on protected files and folders.

"The most straight-forward implication of a SIP bypass is that [...] an attacker can create files that are protected by SIP and therefore undeletable by ordinary means," Microsoft researchers Jonathan Bar Or, Michael Pearse, and Anurag Bohra said.

WebKit Under Attack: Apple Issues Emergency Patches for 3 New Zero-Day Vulnerabilities

Zero-Day Vulnerabilities

CATEGORIE : Apple

DATE: 26.7.23

WEB : The Hacker News

Apple on Thursday rolled out security updates to iOS, iPadOS, macOS, tvOS, watchOS, and the Safari web browser to address three new zero-day flaws that it said are being actively exploited in the wild.

The three security shortcomings are listed below -

CVE-2023-32409 - A WebKit flaw that could be exploited by a malicious actor to break out of the Web Content sandbox. It was addressed with improved bounds checks.

Android Spy App LetMeSpy Suffers Major Data Breach, Exposing Users' Personal Data

Arabian Android

CATEGORIE : Android

DATE: 26.7.23

WEB : The Hacker News

Android-based phone monitoring app LetMeSpy has disclosed a security breach that allowed an unauthorized third-party to steal sensitive data associated with thousands of Android users.

"As a result of the attack, the criminals gained access to email addresses, telephone numbers and the content of messages collected on accounts," LetMeSpy said in an announcement on its website, noting the incident took place on June 21, 2023.

Following the discovery of the hack, LetMeSpy said it notified law enforcement and data protection authorities. It's also taking steps to suspend all account-related functions until further notice. The identity of the threat actor and their motives are currently unknown.

Fleckpe Android Malware Sneaks onto Google Play Store with Over 620,000 Downloads

Fleckpe Android Malware

CATEGORIE : Android

DATE: 26.7.23

WEB : The Hacker News

A new Android subscription malware named Fleckpe has been unearthed on the Google Play Store, amassing more than 620,000 downloads in total since 2022.

Kaspersky, which identified 11 apps on the official app storefront, said the malware masqueraded as legitimate photo editing apps, camera, and smartphone wallpaper packs. The apps have since been taken down.

The operation primarily targets users from Thailand, although telemetry data gathered by the Russian cybersecurity firm has revealed victims in Poland, Malaysia, Indonesia, and Singapore.

This Cybercrime Syndicate Pre-Infected Over 8.9 Million Android Phones Worldwide

Android Phone Hacking

CATEGORIE : Android

DATE: 26.7.23

WEB : The Hacker News

A cybercrime enterprise known as Lemon Group is leveraging millions of pre-infected Android smartphones worldwide to carry out their malicious operations, posing significant supply chain risks.

"The infection turns these devices into mobile proxies, tools for stealing and selling SMS messages, social media and online messaging accounts and monetization via advertisements and click fraud," cybersecurity firm Trend Micro said.

The activity encompasses no fewer than 8.9 million compromised Android devices, particularly budget phones, with the highest concentration of the infections discovered in the U.S., Mexico, Indonesia, Thailand, Russia, South Africa, India, Angola, the Philippines, and Argentina.

macOS Under Attack: Examining the Growing Threat and User Perspectives

macOS Under Attack

CATEGORIE : Apple

DATE: 25.7.23 

WEB : The Hacker News

As the number of people using macOS keeps going up, so does the desire of hackers to take advantage of flaws in Apple's operating system.

What Are the Rising Threats to macOS?#There is a common misconception among macOS fans that Apple devices are immune to hacking and malware infection. However, users have been facing more and more dangers recently. Inventive attackers are specifically targeting Mac systems, as seen with the "Geacon" Cobalt Strike tool attack. This tool enables them to perform malicious actions such as data theft, privilege elevation, and remote device control, placing the security and privacy of Mac users at grave risk.

Apple Rolls Out Urgent Patches for Zero-Day Flaws Impacting iPhones, iPads and Macs

Apple App Store

CATEGORIE : Apple

DATE: 25.7.23

WEB : The Hacker News

Apple has rolled out security updates to iOS, iPadOS, macOS, tvOS, watchOS, and Safari to address several security vulnerabilities, including one actively exploited zero-day bug in the wild.

Tracked as CVE-2023-38606, the shortcoming resides in the kernel and permits a malicious app to modify sensitive kernel state potentially. The company said it was addressed with improved state management.

"Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1," the tech giant noted in its advisory.

Two Spyware Apps on Google Play with 1.5 Million Users Sending Data to China

Spyware Apps

CATEGORIE : Android

DATE: 8.7.23

WEB : The Hacker News

Two file management apps on the Google Play Store have been discovered to be spyware, putting the privacy and security of up to 1.5 million Android users at risk. These apps engage in deceptive behaviour and secretly send sensitive user data to malicious servers in China. Pradeo, a leading mobile security company, has uncovered this alarming infiltration. The report shows that both spyware apps, namely File Recovery and Data Recovery (com.spot.music.filedate) with over 1 million installs, and File Manager (com.file.box.master.gkd) with over 500,000 installs, are developed by the same group. These seemingly harmless Android apps use similar malicious tactics and automatically launch when the device reboots without user input.

Google Releases Android Patch Update for 3 Actively Exploited Vulnerabilities

Arabian Android

CATEGORIE : Android

DATE: 7.7.23

WEB : The Hacker News

Google has released its monthly security updates for the Android operating system, addressing 46 new software vulnerabilities. Among these, three vulnerabilities have been identified as actively exploited in targeted attacks.

One of the vulnerabilities tracked as CVE-2023-26083 is a memory leak flaw affecting the Arm Mali GPU driver for Bifrost, Avalon, and Valhall chips. This particular vulnerability was exploited in a previous attack that enabled spyware infiltration on Samsung devices in December 2022.

Mexico-Based Hacker Targets Global Banks with Android Malware

Android Malware

CATEGORIE : Android

DATE: 4.7.23

WEB : The Hacker News

An e-crime actor of Mexican provenance has been linked to an Android mobile malware campaign targeting financial institutions globally, but with a specific focus on Spanish and Chilean banks, from June 2021 to April 2023.

The activity is being attributed to an actor codenamed Neo_Net, according to security researcher Pol Thill. The findings were published by SentinelOne following a Malware Research Challenge in collaboration with vx-underground.

"Despite using relatively unsophisticated tools, Neo_Net has achieved a high success rate by tailoring their infrastructure to specific targets, resulting in the theft of over 350,000 EUR from victims' bank accounts and compromising Personally Identifiable Information (PII) of thousands of victims," Thill said.

Beware: New 'Rustbucket' Malware Variant Targeting macOS Users

macOS hacking

CATEGORIE : Apple

DATE: 1.7.23

WEB : The Hacker News

Researchers have pulled back the curtain on an updated version of an Apple macOS malware called Rustbucket that comes with improved capabilities to establish persistence and avoid detection by security software.

"This variant of Rustbucket, a malware family that targets macOS systems, adds persistence capabilities not previously observed," Elastic Security Labs researchers said in a report published this week, adding it's "leveraging a dynamic network infrastructure methodology for command-and-control."

RustBucket is the work of a North Korean threat actor known as BlueNoroff, which is part of a larger intrusion set tracked under the name Lazarus Group, an elite hacking unit supervised by the Reconnaissance General Bureau (RGB), the country's primary intelligence agency.

Fluhorse: Flutter-Based Android Malware Targets Credit Cards and 2FA Codes

Android Malware

CATEGORIE : Android

DATE: 30.6.23

WEB : The Hacker News

Cybersecurity researchers have shared the inner workings of an Android malware family called Fluhorse.

The malware "represents a significant shift as it incorporates the malicious components directly within the Flutter code," Fortinet FortiGuard Labs researcher Axelle Apvrille said in a report published last week.

Fluhorse was first documented by Check Point in early May 2023, detailing its attacks on users located in East Asia through rogue apps masquerading as ETC and VPBank Neo, which are popular in Taiwan and Vietnam. The initial intrusion vector for the malware is phishing.

Rogue Android Apps Target Pakistani Individuals in Sophisticated Espionage Campaign

Rogue Android Apps

CATEGORIE : Android

DATE: 30.6.23

WEB : The Hacker News

Individuals in the Pakistan region have been targeted using two rogue Android apps available on the Google Play Store as part of a new targeted campaign.

Cybersecurity firm Cyfirma attributed the campaign with moderate confidence to a threat actor known as DoNot Team, which is also tracked as APT-C-35 and Viceroy Tiger.

The espionage activity involves duping Android smartphone owners into downloading a program that's used to extract contact and location data from unwitting victims.

Over 60K Adware Apps Posing as Cracked Versions of Popular Apps Target Android Devices

Adware Apps

CATEGORIE : Android

DATE: 7.6.23

WEB : The Hacker News

Thousands of adware apps for Android have been found to masquerade as cracks or modded versions of popular applications to serve unwanted ads to users as part of a campaign ongoing since October 2022.

"The campaign is designed to aggressively push adware to Android devices with the purpose to drive revenue," Bitdefender said in a technical report shared with The Hacker News. "However, the threat actors involved can easily switch tactics to redirect users to other types of malware such as banking Trojans to steal credentials and financial information or ransomware.

Predator Android Spyware: Researchers Uncover New Data Theft Capabilities

Predator Android Spyware

CATEGORIE : Android

DATE: 28.5.23

WEB : The Hacker News

Security researchers have detailed the inner workings of the commercial Android spyware called Predator, which is marketed by the Israeli company Intellexa (previously Cytrox).

Predator was first documented by Google's Threat Analysis Group (TAG) in May 2022 as part of attacks leveraging five different zero-day flaws in the Chrome web browser and Android.

The spyware, which is delivered by means of another loader component called Alien, is equipped to record audio from phone calls and VoIP-based apps as well as gather contacts and messages, including from Signal, WhatsApp, and Telegram.

Data Stealing Malware Discovered in Popular Android Screen Recorder App

Data Stealing Malware

CATEGORIE : Android

DATE: 24.5.23

WEB : The Hacker News

Google has removed a screen recording app named "iRecorder - Screen Recorder" from the Play Store after it was found to sneak in information stealing capabilities nearly a year after the app was published as an innocuous app.

The app (APK package name "com.tsoft.app.iscreenrecorder"), which accrued over 50,000 installations, was first uploaded on September 19, 2021. The malicious functionality is believed to have been introduced in version 1.3.8, which was released on August 24, 2022.

"It is rare for a developer to upload a legitimate app, wait almost a year, and then update it with malicious code," ESET security researcher Lukáš Štefanko said in a technical report.

Zero-Day Alert: Apple Releases Patches for Actively Exploited Flaws in iOS, macOS, and Safari

Apple App Store

CATEGORIE : Apple

DATE: 22.6.23

WEB : The Hacker News

Apple on Wednesday released a slew of updates for iOS, iPadOS, macOS, watchOS, and Safari browser to address a set of flaws it said were actively exploited in the wild.

This includes a pair of zero-days that have been weaponized in a mobile surveillance campaign called Operation Triangulation that has been active since 2019. The exact threat actor behind the campaign is not known.

CVE-2023-32434 - An integer overflow vulnerability in the Kernel that could be exploited by a malicious app to execute arbitrary code with kernel privileges.

New Report Exposes Operation Triangulation's Spyware Implant Targeting iOS Devices

Apple App Store

CATEGORIE : Apple

DATE: 22.6.23

WEB : The Hacker News

More details have emerged about the spyware implant that's delivered to iOS devices as part of a campaign called Operation Triangulation.

Kaspersky, which discovered the operation after becoming one of the targets at the start of the year, said the malware has a lifespan of 30 days, after which it gets automatically uninstalled unless the time period is extended by the attackers.

The Russian cybersecurity company has codenamed the backdoor TriangleDB.

Researchers Discover New Sophisticated Toolkit Targeting Apple macOS Systems

Apple App Store

CATEGORIE : Apple

DATE: 19.6.23

WEB : The Hacker News

Cybersecurity researchers have uncovered a set of malicious artifacts that they say is part of a sophisticated toolkit targeting Apple macOS systems.

"As of now, these samples are still largely undetected and very little information is available about any of them," Bitdefender researchers Andrei Lapusneanu and Bogdan Botezatu said in a preliminary report published on Friday.

The Romanian firm's analysis is based on an examination of four samples that were uploaded to VirusTotal by an unnamed victim. The earliest sample dates back to April 18, 2023.

Apple's Safari Private Browsing Now Automatically Removes Tracking Parameters in URLs

Apple Safari

CATEGORIE : Apple

DATE: 12.6.23

WEB : The Hacker News

Apple is introducing major updates to Safari Private Browsing, offering users better protections against third-party trackers as they browse the web.

"Advanced tracking and fingerprinting protections go even further to help prevent websites from using the latest techniques to track or identify a user's device," the iPhone maker said.

"Private Browsing now locks when not in use, allowing a user to keep tabs open even when stepping away from the device."

New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware

Zero-Click iOS Hacking Malware

CATEGORIE : Apple

DATE: 1.6.23

WEB : The Hacker News

A previously unknown advanced persistent threat (APT) is targeting iOS devices as part of a sophisticated and long-running mobile campaign dubbed Operation Triangulation that began in 2019.

"The targets are infected using zero-click exploits via the iMessage platform, and the malware runs with root privileges, gaining complete control over the device and user data," Kaspersky said.

The Russian cybersecurity company said it discovered traces of compromise after creating offline backups of the targeted devices.

Apple Thwarts $2 Billion in App Store Fraud, Rejects 1.7 Million App Submissions

Apple App Store

CATEGORIE : Apple

DATE: 18.5.23

WEB : The Hacker News

Apple has announced that it prevented over $2 billion in potentially fraudulent transactions and rejected roughly 1.7 million app submissions for privacy and security violations in 2022.

The computing giant said it terminated 428,000 developer accounts for potential fraudulent activity, blocked 105,000 fake developer account creations, and deactivated 282 million bogus customer accounts. It further noted that it thwarted 198 million attempted fraudulent new accounts prior to their creation.

OilAlpha: Emerging Houthi-linked Cyber Threat Targets Arabian Android Users

Arabian Android

CATEGORIE : Android

DATE: 18.5.23

WEB : The Hacker News

A hacking group dubbed OilAlpha with suspected ties to Yemen's Houthi movement has been linked to a cyber espionage campaign targeting development, humanitarian, media, and non-governmental organizations in the Arabian peninsula.

"OilAlpha used encrypted chat messengers like WhatsApp to launch social engineering attacks against its targets," cybersecurity company Recorded Future said in a technical report published Tuesday.

Apple Thwarts $2 Billion in App Store Fraud, Rejects 1.7 Million App Submissions

Apple App Store

CATEGORIE : Apple

DATE: 18.5.23

WEB : The Hacker News

Apple has announced that it prevented over $2 billion in potentially fraudulent transactions and rejected roughly 1.7 million app submissions for privacy and security violations in 2022.

The computing giant said it terminated 428,000 developer accounts for potential fraudulent activity, blocked 105,000 fake developer account creations, and deactivated 282 million bogus customer accounts. It further noted that it thwarted 198 million attempted fraudulent new accounts prior to their creation.

In contrast, Apple is estimated to have booted out 802,000 developer accounts in 2021. The company attributed the decline to new App Store "methods and protocols" that prevent the creation of such accounts in the first place.

New Android Malware 'FluHorse' Targeting East Asian Markets with Deceptive Tactics

Android Malware

CATEGORIE : Android

DATE: 6.5.23

WEB : The Hacker News

Various sectors in East Asian markets have been subjected to a new email phishing campaign that distributes a previously undocumented strain of Android malware called FluHorse that abuses the Flutter software development framework.

"The malware features several malicious Android applications that mimic legitimate applications, most of which have more than 1,000,000 installs," Check Point said in a technical report. "These malicious apps steal the victims' credentials and two-factor authentication (2FA) codes."

BouldSpy Android Spyware: Iranian Government's Alleged Tool for Spying on Minority Groups

BouldSpy Android Spyware

CATEGORIE : Android

DATE: 3.5.23

WEB : The Hacker News

A new Android surveillanceware possibly used by the Iranian government has been used to spy on over 300 individuals belonging to minority groups.

The malware, dubbed BouldSpy, has been attributed with moderate confidence to the Law Enforcement Command of the Islamic Republic of Iran (FARAJA). Targeted victims include Iranian Kurds, Baluchis, Azeris, and Armenian Christian groups.

"The spyware may also have been used in efforts to counter and monitor illegal trafficking activity related to arms, drugs, and alcohol," Lookout said, based on exfiltrated data that contained photos of drugs, firearms, and official documents issued by FARAJA.

Google Blocks 1.43 Million Malicious Apps, Bans 173,000 Bad Accounts in 2022

Arabian Android

CATEGORIE : Android

DATE: 1.5.23

WEB : The Hacker News

Google disclosed that its improved security features and app review processes helped it block 1.43 million bad apps from being published to the Play Store in 2022.

In addition, the company said it banned 173,000 bad accounts and fended off over $2 billion in fraudulent and abusive transactions through developer-facing features like Voided Purchases API, Obfuscated Account ID, and Play Integrity API.

The addition of identity verification methods such as phone number and email address to join Google Play contributed to a reduction in accounts used to publish apps that go against its policies, Google pointed out.

New Atomic macOS Malware Steals Keychain Passwords and Crypto Wallets

CATEGORIE : Apple

DATE: 28.4.23

WEB : The Hacker News

Threat actors are advertising a new information stealer for the Apple macOS operating system called Atomic macOS Stealer (or AMOS) on Telegram for $1,000 per month, joining the likes of MacStealer.

"The Atomic macOS Stealer can steal various types of information from the victim's machine, including Keychain passwords, complete system information, files from the desktop and documents folder, and even the macOS password," Cyble researchers said in a technical report.NSO Group Used 3 Zero-Click iPhone Exploits Against Human Rights Defenders

Zero-Click iPhone

CATEGORIE : Apple

DATE:20.4.23

WEB : The Hacker News

Israeli spyware maker NSO Group deployed at least three novel "zero-click" exploits against iPhones in 2022 to infiltrate defenses erected by Apple and deploy Pegasus, according to the latest findings from Citizen Lab.

"NSO Group customers widely deployed at least three iOS 15 and iOS 16 zero-click exploit chains against civil society targets around the world," the interdisciplinary laboratory based at the University of Toronto said.

Goldoson Android Malware Infects Over 100 Million Google Play Store Downloads

Arabian Android

CATEGORIE : Android

DATE: 18.4.23

WEB : The Hacker News

A new Android malware strain named Goldoson has been detected in the official Google Play Store spanning more than 60 legitimate apps that collectively have over 100 million downloads.

An additional eight million installations have been tracked through ONE store, a leading third-party app storefront in South Korea.

The rogue component is part of a third-party software library used by the apps in question and is capable of gathering information about installed apps, Wi-Fi and Bluetooth-connected devices, and GPS locations.

Severe Android and Novi Survey Vulnerabilities Under Active Exploitation

Arabian Android

CATEGORIE : Android

DATE: 14.4.23

WEB : The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.

The two flaws are listed below -

CVE-2023-20963 (CVSS score: 7.8) - Android Framework Privilege Escalation Vulnerability

Israel-based Spyware Firm QuaDream Targets High-Risk iPhones with Zero-Click Exploit

Apple App Store

CATEGORIE : Apple

DATE: 12.4.23

WEB : The Hacker News

Threat actors using hacking tools from an Israeli surveillanceware vendor named QuaDream targeted at least five members of civil society in North America, Central Asia, Southeast Asia, Europe, and the Middle East.

According to findings from a group of researchers from the Citizen Lab, the spyware campaign was directed against journalists, political opposition figures, and an NGO worker in 2021. The names of the victims were not disclosed.

It's also suspected that the company abused a zero-click exploit dubbed ENDOFDAYS in iOS 14 to deploy spyware as a zero-day in version 14.4 and 14.4.2. There is no evidence that the exploit has been used after March 2021.

Cybercriminals Turn to Android Loaders on Dark Web to Evade Google Play Security

Android Loaders

CATEGORIE : Android

DATE: 11.4.23

WEB : The Hacker News

Malicious loader programs capable of trojanizing Android applications are being traded on the criminal underground for up to $20,000 as a way to evade Google Play Store defenses.

"The most popular application categories to hide malware and unwanted software include cryptocurrency trackers, financial apps, QR-code scanners, and even dating apps," Kaspersky said in a new report based on messages posted on online forums between 2019 and 2023.

Apple Releases Updates to Address Zero-Day Flaws in iOS, iPadOS, macOS, and Safari

Apple App Store

CATEGORIE : Apple

DATE: 8.4.23

WEB : The Hacker News

Apple on Friday released security updates for iOS, iPadOS, macOS, and Safari web browser to address a pair of zero-day flaws that are being exploited in the wild.

The two vulnerabilities are as follows -

CVE-2023-28205 - A use after free issue in WebKit that could lead to arbitrary code execution when processing specially crafted web content.

Google Mandates Android Apps to Offer Easy Account Deletion In-App and Online

Arabian Android

CATEGORIE : Android

DATE: 6.4.23

WEB : The Hacker News

Google is enacting a new data deletion policy for Android apps that allow account creation to also offer users with a setting to delete their accounts in an attempt to provide more transparency and control over their data.

"For apps that enable app account creation, developers will soon need to provide an option to initiate account and data deletion from within the app and online," Bethel Otuteye, senior director of product management for Android App Safety, said.

Spyware Vendors Caught Exploiting Zero-Day Vulnerabilities on Android and iOS Devices

Android Banking Trojan

CATEGORIE : OS

SUBKATEGORIE : OS

DATE: 29.3.23

A number of zero-day vulnerabilities that were addressed last year were exploited by commercial spyware vendors to target Android and iOS devices, Google's Threat Analysis Group (TAG) has revealed.

The two distinct campaigns were both limited and highly targeted, taking advantage of the patch gap between the release of a fix and when it was actually deployed on the targeted devices.

"These vendors are enabling the proliferation of dangerous hacking tools, arming governments that would not be able to develop these capabilities in-house," TAG's Clement Lecigne said in a new report.

Apple Issues Urgent Security Update for Older iOS and iPadOS Models

Apple App Store

CATEGORIE : Apple

DATE: 28.3.23

WEB : The Hacker News

Apple on Monday backported fixes for an actively exploited security flaw to older iPhone and iPad models.

The issue, tracked as CVE-2023-23529, concerns a type confusion bug in the WebKit browser engine that could lead to arbitrary code execution.

It was originally addressed by the tech giant with improved checks as part of updates released on February 13, 2023. An anonymous researcher has been credited with reporting the bug.

New MacStealer macOS Malware Steals iCloud Keychain Data and Passwords

MacStealer macOS Malware

CATEGORIE : Apple

DATE: 28.3.23

WEB : The Hacker News

A new information-stealing malware has set its sights on Apple's macOS operating system to siphon sensitive information from compromised devices.

Dubbed MacStealer, it's the latest example of a threat that uses Telegram as a command-and-control (C2) platform to exfiltrate data. It primarily affects devices running macOS versions Catalina and later running on M1 and M2 CPUs.

"MacStealer has the ability to steal documents, cookies from the victim's browser, and login information," Uptycs researchers Shilpesh Trivedi and Pratik Jeware said in a new report.

Nexus: A New Rising Android Banking Trojan Targeting 450 Financial Apps

Android Banking Trojan

CATEGORIE : Android

DATE: 23.3.23

WEB : The Hacker News

An emerging Android banking trojan dubbed Nexus has already been adopted by several threat actors to target 450 financial applications and conduct fraud.

"Nexus appears to be in its early stages of development," Italian cybersecurity firm Cleafy said in a report published this week.

"Nexus provides all the main features to perform ATO attacks (Account Takeover) against banking portals and cryptocurrency services, such as credentials stealing and SMS interception."