|
[p]
[font size="4"][br][p][font size="4"]Security researchers revealed an ongoing Android malware campaign dubbed[strong]ViceLeaker[/strong]that has been active since 2016. According to the researchers from Kaspersky, a hacker group has been found targeting Israel citizens and other Middle East countries with surveillance malware named[strong]Triout[/strong].[br][div align="center"][font size="4"][img width="640" height="414" src="https://www.cisomag.com/wp-content/uploads/2019/06/Malware-640x414.jpg" border="0" alt=""][/div][p][font size="4"]The malware is designed to steal sensitive information, including call recordings, text messages, photos, videos, and location data without users’ knowledge. Apart from spying features, the malware also has backdoor capabilities, including upload, download, delete files, record surrounding audio, takeover camera, and make calls or send messages to specific numbers, according to the researchers.[p][font size="4"]The researchers said that attackers used Smali injection technique, that allows hackers to disassemble the code of an original application and add malicious code.[p][font size="4"]Initial analysis revealed that hackers were targeting “dozens of mobile Android devices belonging to Israeli citizens.” The spyware sensors used by Kaspersky detected attack signals from the device belonging to one of the victims along with the hash of an Android application (APK) involved in the attack.[br][div align="center"][font size="4"][img width="478" height="288" src="https://www.hackread.com/wp-content/uploads/2019/06/viceleaker-android-malware-steals-call-recordings-photos-videos-texts-2.jpg" border="0" alt=""][/div][p][font size="4"]Researchers then tagged a sample of their own to inspect further and discovered that the APK’s inner functionalities included launching a malicious payload, which was already embedded in the APK’s original coding.[p][font size="4"]Similar research from Kaspersky revealed that the number of Distributed Denial of Service (DDoS) attacks increased by 84 percent in the first quarter of 2019 compared to Q4 of 2018. In its research report dubbed DDoS Attacks in Q1 2019, Kaspersky stated that cybercriminals are once again turning to DDoS attacks after a sustained time period.[p][font size="4"]The Moscow-based cybersecurity firm also revealed that it discovered a considerable growth in the number of attacks that lasted more than an hour. According to the research findings, China reported the highest number of DDoS attacks (67%) while the U.S. reported the second largest attacks (17.17%) and Hong Kong stood third (4.81%).[p][font size="4"]What’s most concerning is the fact that malware attacks against Android users are at its peak. In the last couple of days, researchers have already exposed two other campaigns targeting unsuspecting users including cryptomining malware and malware capable of bypassing 2FA and stealing the one-time password.[p][font size="4"]It is advised that you must refrain from downloading unnecessary apps from Play Store and third-party websites.[font size="4"][br][div align="center"][font size="4"][font color="#ff8c00"][strong]Stay Alert. Stay safe![/strong][/div][div align="center"][font size="4"][font color="#ff8c00"][strong][br][/strong][/div][h5][a href="https://www.cisomag.com/new-malware-campaign-viceleaker-targeting-android-devices-researchers/" target="_blank" style="font-size: 17px;"]Source 1[/a][font size="4"]|[a href="https://www.hackread.com/viceleaker-android-malware-steals-call-recordings-photos-videos-texts/" target="_blank" style="font-size: 17px;"]Source 2[/a][/h5] |
|