ARTICLES  HOME  MARCH  Android  


H  AI() APT()  Attack() BigBrothers() BotNet() Crime() Cryptocurrency() Cyber() Exploit() Hacking() ICS() Incindent() IoT() Mobil() OS() Phishing() Ransom() Safety() Security() Social() Spam() Virus() Vulnerebility()


New Sneaky Xamalicious Android Malware Hits Over 327,000 Devices

CATEGORIE : Android

DATE: 27.12.23

WEB : The Hacker News

A new Android backdoor has been discovered with potent capabilities to carry out a range of malicious actions on infected devices.

Dubbed Xamalicious by the McAfee Mobile Research Team, the malware is so named for the fact that it's developed using an open-source mobile app framework called Xamarin and abuses the operating system's accessibility permissions to fulfill its objectives.

Chameleon Android Banking Trojan Variant Bypasses Biometric Authentication

CATEGORIE : Android

DATE: 23.12.23

WEB : The Hacker News

Cybersecurity researchers have discovered an updated version of an Android banking malware called Chameleon that has expanded its targeting to include users in the U.K. and Italy.

"Representing a restructured and enhanced iteration of its predecessor, this evolved Chameleon variant excels in executing Device Takeover (DTO) using the accessibility service, all while expanding its targeted region," Dutch mobile security firm ThreatFabric said in a report shared with The Hacker News.

Google Using Clang Sanitizers to Protect Android Against Cellular Baseband Vulnerabilities

CATEGORIE : Android

DATE: 13.12.23

WEB : The Hacker News

Google is highlighting the role played by Clang sanitizers in hardening the security of the cellular baseband in the Android operating system and preventing specific kinds of vulnerabilities.

This comprises Integer Overflow Sanitizer (IntSan) and BoundsSanitizer (BoundSan), both of which are part of UndefinedBehaviorSanitizer (UBSan), a tool designed to catch various kinds of undefined behavior during program execution.

SpyLoan Scandal: 18 Malicious Loan Apps Defraud Millions of Android Users

CATEGORIE : Android

DATE: 11.12.23

WEB : The Hacker News

Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded over 12 million times.

"Despite their attractive appearance, these services are in fact designed to defraud users by offering them high-interest-rate loans endorsed with deceitful descriptions, all while collecting their victims' personal and financial information to blackmail them, and in the end gain their funds," ESET said.

New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia

CATEGORIE : Android

DATE: 1.12.23

WEB : The Hacker News

Cybersecurity researchers have disclosed a new sophisticated Android malware called FjordPhantom that has been observed targeting users in Southeast Asian countries like Indonesia, Thailand, and Vietnam since early September 2023.

"Spreading primarily through messaging services, it combines app-based malware with social engineering to defraud banking customers," Oslo-based mobile app security firm Promon said in an analysis published Thursday.

200+ Malicious Android Apps Targeting Iranian Banks: Experts Warn

CATEGORIE : Android

DATE: 29.11.23

WEB : The Hacker News

An Android malware campaign targeting Iranian banks has expanded its capabilities and incorporated additional evasion tactics to fly under the radar.

That's according to a new report from Zimperium, which discovered more than 200 malicious apps associated with the malicious operation, with the threat actor also observed carrying out phishing attacks against the targeted financial institutions.

Malicious Apps Disguised as Banks and Government Agencies Targeting Indian Android Users

CATEGORIE : Android

DATE: 21.11.23

WEB : The Hacker News

Android smartphone users in India are the target of a new malware campaign that employs social engineering lures to install fraudulent apps that are capable of harvesting sensitive data.

"Using social media platforms like WhatsApp and Telegram, attackers are sending messages designed to lure users into installing a malicious app on their mobile device by impersonating legitimate organizations, such as banks, government services, and utilities," Microsoft threat intelligence researchers Abhishek Pustakala, Harshita Tripathi, and Shivang Desai said in a Monday analysis.

Stealthy Kamran Spyware Targeting Urdu-speaking Users in Gilgit-Baltistan

CATEGORIE : Android

DATE: 10.11.23

WEB : The Hacker News

Urdu-speaking readers of a regional news website that caters to the Gilgit-Baltistan region have likely emerged as a target of a watering hole attack designed to deliver a previously undocumented Android spyware dubbed Kamran.

The campaign, ESET has discovered, leverages Hunza News (urdu.hunzanews[.]net), which, when opened on a mobile device, prompts visitors of the Urdu version to install its Android app directly hosted on the website.

Google Play Store Introduces 'Independent Security Review' Badge for Apps

CATEGORIE : Android

DATE: 4.11.23

WEB : The Hacker News

Google is rolling out an "Independent security review" badge in the Play Store's Data safety section for Android apps that have undergone a Mobile Application Security Assessment (MASA) audit.

"We've launched this banner beginning with VPN apps due to the sensitive and significant amount of user data these apps handle," Nataliya Stanetsky of the Android Security and Privacy Team said.

Google Play Protect Introduces Real-Time Code-Level Scanning for Android Malware

CATEGORIE : Android

DATE: 19.10.23

WEB : The Hacker News

Google has announced an update to its Play Protect with support for real-time scanning at the code level to tackle novel malicious apps prior to downloading and installing them on Android devices.

"Google Play Protect will now recommend a real-time app scan when installing apps that have never been scanned before to help detect emerging threats," the tech giant said.

SpyNote: Beware of This Android Trojan that Records Audio and Phone Calls

CATEGORIE : Android

DATE: 16.10.23

WEB : The Hacker News

The Android banking trojan known as SpyNote has been dissected to reveal its diverse information-gathering features.

Typically spread via SMS phishing campaigns, attack chains involving the spyware trick potential victims into installing the app by clicking on the embedded link, according to F-Secure.

GoldDigger Android Trojan Targets Banking Apps in Asia Pacific Countries

CATEGORIE : Android

DATE: 4.10.23

WEB : The Hacker News

A new Android banking trojan named GoldDigger has been found targeting several financial applications with an aim to siphon victims' funds and backdoor infected devices.

"The malware targets more than 50 Vietnamese banking, e-wallet and crypto wallet applications," Group-IB said. "There are indications that this threat might be poised to extend its reach across the wider APAC region and to Spanish-speaking countries."

Researchers Link DragonEgg Android Spyware to LightSpy iOS Surveillanceware

CATEGORIE : Android

DATE: 4.10.23

WEB : The Hacker News

New findings have identified connections between an Android spyware called DragonEgg and another sophisticated modular iOS surveillanceware tool named LightSpy.

DragonEgg, alongside WyrmSpy (aka AndroidControl), was first disclosed by Lookout in July 2023 as a strain of malware capable of gathering sensitive data from Android devices. It was attributed to the Chinese nation-state group APT41.

Zanubis Android Banking Trojan Poses as Peruvian Government App to Target Users

CATEGORIE : Android

DATE: 2.10.23

WEB : The Hacker News

An emerging Android banking trojan called Zanubis is now masquerading as a Peruvian government app to trick unsuspecting users into installing the malware.

"Zanubis's main infection path is through impersonating legitimate Peruvian Android applications and then tricking the user into enabling the Accessibility permissions in order to take full control of the device," Kaspersky said in an analysis published last week.

Hook: New Android Banking Trojan That Expands on ERMAC's Legacy

Android Banking Trojan

CATEGORIE : Android

DATE: 18.9.23

WEB : The Hacker News

A new analysis of the Android banking trojan known as Hook has revealed that it's based on its predecessor called ERMAC.

"The ERMAC source code was used as a base for Hook," NCC Group security researchers Joshua Kamp and Alberto Segura said in a technical analysis published last week.

Millions Infected by Spyware Hidden in Fake Telegram Apps on Google Play

Fake Telegram Apps

CATEGORIE : Android

DATE: 9.9.23

WEB : The Hacker News

Spyware masquerading as modified versions of Telegram have been spotted in the Google Play Store that's designed to harvest sensitive information from compromised Android devices.

According to Kaspersky security researcher Igor Golovin, the apps come with nefarious features to capture and exfiltrate names, user IDs, contacts, phone numbers, and chat messages to an actor-controlled server.

MMRat Android Trojan Executes Remote Financial Fraud Through Accessibility Feature

Android Banking Malware

CATEGORIE : Android

DATE: 31.8.23

WEB : The Hacker News

A previously undocumented Android banking trojan dubbed MMRat has been observed targeting mobile users in Southeast Asia since late June 2023 to remotely commandeer the devices and perform financial fraud.

"The malware, named after its distinctive package name com.mm.user, can capture user input and screen content, and can also remotely control victim devices through various techniques, enabling its operators to carry out bank fraud on the victim's device," Trend Micro said.

China-Linked BadBazaar Android Spyware Targeting Signal and Telegram Users

Spyware

CATEGORIE : Android

DATE: 31.8.23

WEB : The Hacker News

Cybersecurity researchers have discovered malicious Android apps for Signal and Telegram distributed via the Google Play Store and Samsung Galaxy Store that are engineered to deliver the BadBazaar spyware on infected devices. Slovakian company ESET attributed the campaign to a China-linked actor called GREF.

Thousands of Android Malware Apps Using Stealthy APK Compression to Evade Detection

Android Malware Apps

CATEGORIE : Android

DATE: 19.8.23

WEB : The Hacker News

Threat actors are using Android Package (APK) files with unknown or unsupported compression methods to elude malware analysis.

That's according to findings from Zimperium, which found 3,300 artifacts leveraging such compression algorithms in the wild. 71 of the identified samples can be loaded on the operating system without any problems.

There is no evidence that the apps were available on the Google Play Store at any point in time, indicating that the apps were distributed through other means, typically via untrusted app stores or social engineering to trick the victims into sideloading them.

Gigabud RAT Android Banking Malware Targets Institutions Across Countries

Gigabud RAT Android Banking Malware

CATEGORIE : Android

DATE: 16.8.23

WEB : The Hacker News

Account holders of over numerous financial institutions in Thailand, Indonesia, Vietnam, the Philippines, and Peru are being targeted by an Android banking malware called Gigabud RAT.

"One of Gigabud RAT's unique features is that it doesn't execute any malicious actions until the user is authorized into the malicious application by a fraudster, [...] which makes it harder to detect," Group-IB researchers Pavel Naumov and Artem Grischenko said.

"Instead of using HTML overlay attacks, Gigabud RAT gathers sensitive information primarily through screen recording."

New Android 14 Security Feature: IT Admins Can Now Disable 2G Networks

Google Android 14

CATEGORIE : Android

DATE: 9.8.23

WEB : The Hacker News

Google has introduced a new security feature in Android 14 that allows IT administrators to disable support for 2G cellular networks in their managed device fleet.

The search giant said it's introducing a second user setting to turn off support, at the model level, for null-ciphered cellular connections.

Malicious Apps Use Sneaky Versioning Technique to Bypass Google Play Store Scanners

Google Play Store Scanners

CATEGORIE : Android

DATE: 3.8.23

WEB : The Hacker News

Threat actors are leveraging a technique called versioning to evade Google Play Store's malware detections and target Android users.

"Campaigns using versioning commonly target users' credentials, data, and finances," Google Cybersecurity Action Team (GCAT) said in its August 2023 Threat Horizons Report shared with The Hacker News.

While versioning is not a new phenomenon, it's sneaky and hard to detect. In this method, a developer releases an initial version of an app on the Play Store that passes Google's pre-publication checks, but is later updated with a malware component.

European Bank Customers Targeted in SpyNote Android Trojan Campaign

SpyNote Android Trojan

CATEGORIE : Android

DATE: 1.8.23

WEB : The Hacker News

Various European customers of different banks are being targeted by an Android banking trojan called SpyNote as part of an aggressive campaign detected in June and July 2023.

"The spyware is distributed through email phishing or smishing campaigns and the fraudulent activities are executed with a combination of remote access trojan (RAT) capabilities and vishing attack," Italian cybersecurity firm Cleafy said in a technical analysis released Monday.

New Android Malware CherryBlos Utilizing OCR to Steal Sensitive Data

Android Malware CherryBlos

CATEGORIE : Android

DATE: 30.7.23

WEB : The Hacker News

A new Android malware strain called CherryBlos has been observed making use of optical character recognition (OCR) techniques to gather sensitive data stored in pictures.

CherryBlos, per Trend Micro, is distributed via bogus posts on social media platforms and comes with capabilities to steal cryptocurrency wallet-related credentials and act as a clipper to substitute wallet addresses when a victim copies a string matching a predefined format is copied to the clipboard.

Two Spyware Apps on Google Play with 1.5 Million Users Sending Data to China

Spyware Apps

CATEGORIE : Android

DATE: 8.7.23

WEB : The Hacker News

Two file management apps on the Google Play Store have been discovered to be spyware, putting the privacy and security of up to 1.5 million Android users at risk. These apps engage in deceptive behaviour and secretly send sensitive user data to malicious servers in China. Pradeo, a leading mobile security company, has uncovered this alarming infiltration. The report shows that both spyware apps, namely File Recovery and Data Recovery (com.spot.music.filedate) with over 1 million installs, and File Manager (com.file.box.master.gkd) with over 500,000 installs, are developed by the same group. These seemingly harmless Android apps use similar malicious tactics and automatically launch when the device reboots without user input.

Google Releases Android Patch Update for 3 Actively Exploited Vulnerabilities

 

CATEGORIE : Android

DATE: 7.7.23

WEB : The Hacker News

Google has released its monthly security updates for the Android operating system, addressing 46 new software vulnerabilities. Among these, three vulnerabilities have been identified as actively exploited in targeted attacks.

One of the vulnerabilities tracked as CVE-2023-26083 is a memory leak flaw affecting the Arm Mali GPU driver for Bifrost, Avalon, and Valhall chips. This particular vulnerability was exploited in a previous attack that enabled spyware infiltration on Samsung devices in December 2022.

Mexico-Based Hacker Targets Global Banks with Android Malware

Android Malware

CATEGORIE : Android

DATE: 4.7.23

WEB : The Hacker News

An e-crime actor of Mexican provenance has been linked to an Android mobile malware campaign targeting financial institutions globally, but with a specific focus on Spanish and Chilean banks, from June 2021 to April 2023.

The activity is being attributed to an actor codenamed Neo_Net, according to security researcher Pol Thill. The findings were published by SentinelOne following a Malware Research Challenge in collaboration with vx-underground.

Fluhorse: Flutter-Based Android Malware Targets Credit Cards and 2FA Codes

Android Malware

CATEGORIE : Android

DATE: 30.6.23

WEB : The Hacker News

Cybersecurity researchers have shared the inner workings of an Android malware family called Fluhorse.

The malware "represents a significant shift as it incorporates the malicious components directly within the Flutter code," Fortinet FortiGuard Labs researcher Axelle Apvrille said in a report published last week.

Android Spy App LetMeSpy Suffers Major Data Breach, Exposing Users' Personal Data

 

CATEGORIE : Android

DATE: 26.7.23

WEB : The Hacker News

Android-based phone monitoring app LetMeSpy has disclosed a security breach that allowed an unauthorized third-party to steal sensitive data associated with thousands of Android users.

"As a result of the attack, the criminals gained access to email addresses, telephone numbers and the content of messages collected on accounts," LetMeSpy said in an announcement on its website, noting the incident took place on June 21, 2023.

Rogue Android Apps Target Pakistani Individuals in Sophisticated Espionage Campaign

Rogue Android Apps

CATEGORIE : Android

DATE: 30.6.23

WEB : The Hacker News

Individuals in the Pakistan region have been targeted using two rogue Android apps available on the Google Play Store as part of a new targeted campaign.

Cybersecurity firm Cyfirma attributed the campaign with moderate confidence to a threat actor known as DoNot Team, which is also tracked as APT-C-35 and Viceroy Tiger.

Over 60K Adware Apps Posing as Cracked Versions of Popular Apps Target Android Devices

Adware Apps

CATEGORIE : Android

DATE: 7.6.23

WEB : The Hacker News

Thousands of adware apps for Android have been found to masquerade as cracks or modded versions of popular applications to serve unwanted ads to users as part of a campaign ongoing since October 2022.

"The campaign is designed to aggressively push adware to Android devices with the purpose to drive revenue," Bitdefender said in a technical report shared with The Hacker News. "However, the threat actors involved can easily switch tactics to redirect users to other types of malware such as banking Trojans to steal credentials and financial information or ransomware."

Predator Android Spyware: Researchers Uncover New Data Theft Capabilities

Predator Android Spyware

CATEGORIE : Android

DATE: 28.5.23

WEB : The Hacker News

Security researchers have detailed the inner workings of the commercial Android spyware called Predator, which is marketed by the Israeli company Intellexa (previously Cytrox).

Predator was first documented by Google's Threat Analysis Group (TAG) in May 2022 as part of attacks leveraging five different zero-day flaws in the Chrome web browser and Android.

The spyware, which is delivered by means of another loader component called Alien, is equipped to record audio from phone calls and VoIP-based apps as well as gather contacts and messages, including from Signal, WhatsApp, and Telegram.

Data Stealing Malware Discovered in Popular Android Screen Recorder App

Data Stealing Malware

CATEGORIE : Android

DATE: 24.5.23

WEB : The Hacker News

Google has removed a screen recording app named "iRecorder - Screen Recorder" from the Play Store after it was found to sneak in information stealing capabilities nearly a year after the app was published as an innocuous app.

The app (APK package name "com.tsoft.app.iscreenrecorder"), which accrued over 50,000 installations, was first uploaded on September 19, 2021. The malicious functionality is believed to have been introduced in version 1.3.8, which was released on August 24, 2022.

This Cybercrime Syndicate Pre-Infected Over 8.9 Million Android Phones Worldwide

Android Phone Hacking

CATEGORIE : Android

DATE: 26.7.23

WEB : The Hacker News

A cybercrime enterprise known as Lemon Group is leveraging millions of pre-infected Android smartphones worldwide to carry out their malicious operations, posing significant supply chain risks.

"The infection turns these devices into mobile proxies, tools for stealing and selling SMS messages, social media and online messaging accounts and monetization via advertisements and click fraud," cybersecurity firm Trend Micro said.

The activity encompasses no fewer than 8.9 million compromised Android devices, particularly budget phones, with the highest concentration of the infections discovered in the U.S., Mexico, Indonesia, Thailand, Russia, South Africa, India, Angola, the Philippines, and Argentina.

OilAlpha: Emerging Houthi-linked Cyber Threat Targets Arabian Android Users

Arabian Android

CATEGORIE : Android

DATE: 18.5.23

WEB : The Hacker News

A hacking group dubbed OilAlpha with suspected ties to Yemen's Houthi movement has been linked to a cyber espionage campaign targeting development, humanitarian, media, and non-governmental organizations in the Arabian peninsula.

"OilAlpha used encrypted chat messengers like WhatsApp to launch social engineering attacks against its targets," cybersecurity company Recorded Future said in a technical report published Tuesday.

"It has also used URL link shorteners. Per victimology assessment, it appears a majority of the targeted entities were Arabic-language speakers and operated Android devices."

New Android Malware 'FluHorse' Targeting East Asian Markets with Deceptive Tactics

Android Malware

CATEGORIE : Android

DATE: 6.5.23

WEB : The Hacker News

Various sectors in East Asian markets have been subjected to a new email phishing campaign that distributes a previously undocumented strain of Android malware called FluHorse that abuses the Flutter software development framework.

"The malware features several malicious Android applications that mimic legitimate applications, most of which have more than 1,000,000 installs," Check Point said in a technical report. "These malicious apps steal the victims' credentials and two-factor authentication (2FA) codes."

Fleckpe Android Malware Sneaks onto Google Play Store with Over 620,000 Downloads

Fleckpe Android Malware

CATEGORIE : Android

DATE: 26.7.23

WEB : The Hacker News

A new Android subscription malware named Fleckpe has been unearthed on the Google Play Store, amassing more than 620,000 downloads in total since 2022.

Kaspersky, which identified 11 apps on the official app storefront, said the malware masqueraded as legitimate photo editing apps, camera, and smartphone wallpaper packs. The apps have since been taken down.

The operation primarily targets users from Thailand, although telemetry data gathered by the Russian cybersecurity firm has revealed victims in Poland, Malaysia, Indonesia, and Singapore.

BouldSpy Android Spyware: Iranian Government's Alleged Tool for Spying on Minority Groups

BouldSpy Android Spyware

CATEGORIE : Android

DATE: 3.5.23

WEB : The Hacker News

A new Android surveillanceware possibly used by the Iranian government has been used to spy on over 300 individuals belonging to minority groups.

The malware, dubbed BouldSpy, has been attributed with moderate confidence to the Law Enforcement Command of the Islamic Republic of Iran (FARAJA). Targeted victims include Iranian Kurds, Baluchis, Azeris, and Armenian Christian groups.

"The spyware may also have been used in efforts to counter and monitor illegal trafficking activity related to arms, drugs, and alcohol," Lookout said, based on exfiltrated data that contained photos of drugs, firearms, and official documents issued by FARAJA.

Google Blocks 1.43 Million Malicious Apps, Bans 173,000 Bad Accounts in 2022

Fleckpe Android Malware

CATEGORIE : Android

DATE: 1.5.23

WEB : The Hacker News

Google disclosed that its improved security features and app review processes helped it block 1.43 million bad apps from being published to the Play Store in 2022.

In addition, the company said it banned 173,000 bad accounts and fended off over $2 billion in fraudulent and abusive transactions through developer-facing features like Voided Purchases API, Obfuscated Account ID, and Play Integrity API.

The addition of identity verification methods such as phone number and email address to join Google Play contributed to a reduction in accounts used to publish apps that go against its policies, Google pointed out.

Goldoson Android Malware Infects Over 100 Million Google Play Store Downloads

Fleckpe Android Malware

CATEGORIE : Android

DATE: 18.4.23

WEB : The Hacker News

A new Android malware strain named Goldoson has been detected in the official Google Play Store spanning more than 60 legitimate apps that collectively have over 100 million downloads.

An additional eight million installations have been tracked through ONE store, a leading third-party app storefront in South Korea.

The rogue component is part of a third-party software library used by the apps in question and is capable of gathering information about installed apps, Wi-Fi and Bluetooth-connected devices, and GPS locations.

Severe Android and Novi Survey Vulnerabilities Under Active Exploitation

Fleckpe Android Malware

CATEGORIE : Android

DATE: 14.4.23

WEB : The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.

The two flaws are listed below -

CVE-2023-20963 (CVSS score: 7.8) - Android Framework Privilege Escalation Vulnerability
 

Cybercriminals Turn to Android Loaders on Dark Web to Evade Google Play Security

Android Loaders

CATEGORIE : Android

DATE: 11.4.23

WEB : The Hacker News

Malicious loader programs capable of trojanizing Android applications are being traded on the criminal underground for up to $20,000 as a way to evade Google Play Store defenses.

"The most popular application categories to hide malware and unwanted software include cryptocurrency trackers, financial apps, QR-code scanners, and even dating apps," Kaspersky said in a new report based on messages posted on online forums between 2019 and 2023.

Google Mandates Android Apps to Offer Easy Account Deletion In-App and Online

Fleckpe Android Malware

CATEGORIE : Android

DATE: 6.4.23

WEB : The Hacker News

6.4.23  Android  The Hacker News
Google is enacting a new data deletion policy for Android apps that allow account creation to also offer users with a setting to delete their accounts in an attempt to provide more transparency and control over their data.

"For apps that enable app account creation, developers will soon need to provide an option to initiate account and data deletion from within the app and online," Bethel Otuteye, senior director of product management for Android App Safety, said.

"This web requirement, which you will link in your Data safety form, is especially important so that a user can request account and data deletion without having to reinstall an app."

Nexus: A New Rising Android Banking Trojan Targeting 450 Financial Apps

Android Banking Trojan

CATEGORIE : Android

DATE: 23.3.23

WEB : The Hacker News

An emerging Android banking trojan dubbed Nexus has already been adopted by several threat actors to target 450 financial applications and conduct fraud.

"Nexus appears to be in its early stages of development," Italian cybersecurity firm Cleafy said in a report published this week.

"Nexus provides all the main features to perform ATO attacks (Account Takeover) against banking portals and cryptocurrency services, such as credentials stealing and SMS interception."