<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>spyware &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/malware/spyware/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Fri, 01 May 2026 17:37:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>spyware &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Android Spyware Platform Enables Resale</title>
		<link>https://firsthackersnews.com/android-spyware-platform/</link>
					<comments>https://firsthackersnews.com/android-spyware-platform/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 01 May 2026 17:36:53 +0000</pubDate>
				<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#AndroidSpyware]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataPrivacy]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#Spyware]]></category>
		<category><![CDATA[#Stalkerware]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11672</guid>

					<description><![CDATA[<p>A newly uncovered Android spyware platform is changing how surveillance malware spreads. Instead of being a single tool,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/android-spyware-platform/">Android Spyware Platform Enables Resale</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly uncovered Android spyware platform is changing how surveillance malware spreads. Instead of being a single tool, it works like a service that anyone can subscribe to, customize, and sell under their own name.</p>



<p>Researchers at Certo identified a spyware tool called <em>KidsProtect</em>, which presents itself as a parental monitoring app. This is a common disguise in the stalkerware space, where intrusive tracking features are marketed as safety tools.</p>



<p>But the reality is different. The platform is openly promoted in hacking communities with claims of stealth and stability, clearly targeting covert surveillance use rather than legitimate parental control.</p>



<p>Through a web dashboard, operators can monitor a device remotely with capabilities that go far beyond basic tracking. This includes listening to calls, accessing messages, tracking live location, and even capturing keystrokes—all without the victim’s knowledge.</p>



<h2 class="wp-block-heading">Deep Device Control and Evasion Tactics</h2>



<p>Once installed, the spyware runs silently in the background and gives attackers near-total visibility into the device.</p>



<p>Key functions include:</p>



<ul class="wp-block-list">
<li>Live microphone access and call recording</li>



<li>Real-time GPS tracking</li>



<li>Reading SMS and app messages (including WhatsApp and Telegram)</li>



<li>Keystroke logging for capturing passwords</li>



<li>Remote access to cameras</li>



<li>Monitoring screen activity in real time</li>
</ul>



<p>To achieve this level of control, the app abuses sensitive Android permissions such as access to location, microphone, camera, and storage. One of the most critical features it exploits is the Accessibility Service, which allows it to read screen content and interact with other apps—making real-time surveillance possible.</p>



<p>The spyware is also built to stay hidden and resist removal. It disguises itself as a system-like app (for example, “WiFi Service”), registers as a Device Administrator, and includes anti-uninstall protection. Even after a device restart, it automatically relaunches using a BootReceiver component.</p>



<p>Victims are often tricked into disabling built-in protections like Google Play Protect, allowing the malware to operate freely without interruption.</p>



<h2 class="wp-block-heading">A Growing Threat Through White-Label Resale</h2>



<p>What makes this platform especially dangerous is its white-label model. Buyers can rebrand the spyware, set their own pricing, and distribute it as if it were their own product. This turns malware into a scalable business model rather than a single tool.</p>



<p>With entry costs starting relatively low, even non-technical users can launch their own spyware operation. This lowers the barrier to entry and allows the ecosystem to grow quickly, even when authorities shut down known stalkerware providers.</p>



<p>The spyware operates under package names like <em>com.example.parentguard</em> and supports Android devices from version 7 onwards. It also allows unencrypted (cleartext) traffic, increasing the risk of data exposure.</p>



<p>Overall, this platform shows how stalkerware is evolving—from isolated tools into commercialized services that enable widespread surveillance with minimal effort.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/android-spyware-platform/">Android Spyware Platform Enables Resale</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/android-spyware-platform/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake Messaging Apps Used to Deliver ProSpy Spyware</title>
		<link>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/</link>
					<comments>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 09:35:08 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11582</guid>

					<description><![CDATA[<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications. The operation delivers an Android spyware known as <strong>ProSpy</strong>, aimed primarily at journalists, activists, and political figures.</p>



<h2 class="wp-block-heading"><strong>Social Engineering and Delivery Tactics</strong></h2>



<p>The attack typically begins with direct contact. Victims are approached through platforms like LinkedIn, email, or messaging apps by accounts posing as journalists, support staff, or known contacts. These interactions are carefully crafted to build trust before introducing a malicious link.</p>



<p>The link is usually presented as something urgent or relevant, such as a video call request, shared document, or account alert. Once clicked, victims are redirected either to fake login pages or download portals.</p>



<p>Common tactics used:</p>



<ul class="wp-block-list">
<li>Impersonation of trusted individuals or organizations</li>



<li>Spearphishing messages tailored to the target</li>



<li>Fake login pages mimicking services like email or cloud platforms</li>



<li>Malicious download links disguised as secure communication tools</li>
</ul>



<p>This approach relies heavily on human trust rather than technical exploitation, making it highly effective even against cautious users.</p>



<h2 class="wp-block-heading"><strong>Fake Apps and Spyware Capabilities</strong></h2>



<p>The core of the campaign is the use of fake Android applications that appear to be secure messaging tools. These apps are distributed through convincing websites that mimic official sources and offer “enhanced” or “pro” versions of popular platforms.</p>



<p>Once installed, the spyware operates silently in the background, collecting and transmitting sensitive data to attacker-controlled servers.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="472" height="325" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png" alt="" class="wp-image-11583" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2-300x207.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png 472w" sizes="(max-width: 472px) 100vw, 472px" /><figcaption class="wp-element-caption">ProSpy searches for backup files from third-party applications and exfiltrates them (Source: Lookout).<br></figcaption></figure>



<p>Key capabilities include:</p>



<ul class="wp-block-list">
<li>Access to contacts, messages, and call-related data</li>



<li>Collection of device information and stored files</li>



<li>Extraction of documents, media, and backup data</li>



<li>Continuous communication with remote command servers</li>
</ul>



<p>The malware is designed to blend in as a legitimate app, making detection difficult for users who install it outside official app stores.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>Broader Implications</strong></h2>



<p>This campaign highlights a growing trend where attackers combine social engineering with mobile spyware to conduct surveillance operations. The targeting of civil society groups suggests a shift toward more personalized and contract-driven espionage activities.</p>



<p>It also reinforces a critical point: even advanced threats often rely on simple entry points — convincing a user to trust and install something that appears legitimate.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools</title>
		<link>https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/</link>
					<comments>https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 24 Feb 2026 10:56:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#BankingTrojan]]></category>
		<category><![CDATA[#CryptoTheft]]></category>
		<category><![CDATA[#Cybercrime]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#iOSSecurity]]></category>
		<category><![CDATA[#MaaS]]></category>
		<category><![CDATA[#MalwareAsAService]]></category>
		<category><![CDATA[#MobileMalware]]></category>
		<category><![CDATA[#MobileSpyware]]></category>
		<category><![CDATA[#OTPBypass]]></category>
		<category><![CDATA[#Smishing]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#ZeroDayRAT]]></category>
		<category><![CDATA[security advisory]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11229</guid>

					<description><![CDATA[<p>ZeroDayRAT is a newly discovered mobile spyware service that targets both Android and iOS devices. Unlike traditional malware</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/">ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>ZeroDayRAT is a newly discovered mobile spyware service that targets both Android and iOS devices. Unlike traditional malware that focuses only on spying or financial theft, this tool combines both into a single platform. It allows attackers to monitor victims in real time while also stealing money directly from banking and cryptocurrency apps.</p>



<p>Security researchers from Cyberthint found that ZeroDayRAT is being sold on Telegram as a Malware-as-a-Service (MaaS). This means even non-technical criminals can subscribe, access a web-based dashboard, and control infected devices remotely.</p>



<p>The infection usually starts with smishing messages — fake SMS alerts pretending to be service providers or app updates. Victims are tricked into installing a malicious Android APK or iOS payload. Once installed, the attacker gains full control through a browser-based control panel.</p>



<p>Through this dashboard, attackers can view device details, monitor messages, track GPS location, and even activate the microphone and camera. The malware also targets financial apps by using clipboard hijacking and fake login overlays to steal credentials. It can intercept OTP codes, allowing criminals to bypass two-factor authentication in real time.</p>



<p>ZeroDayRAT is sold in subscription tiers — $250 per day, $1000 per week, and $3500 per month — and transactions are reportedly handled through escrow services, indicating an organized criminal operation.</p>



<h2 class="wp-block-heading"><strong>What Makes ZeroDayRAT Dangerous</strong></h2>



<ul class="wp-block-list">
<li>Real-time GPS tracking and live surveillance</li>



<li>Remote camera and microphone activation</li>



<li>Screen recording and keylogging</li>



<li>Clipboard hijacking for cryptocurrency theft</li>



<li>Fake login overlays for banking and payment apps</li>



<li>OTP interception to bypass 2FA</li>



<li>Easy-to-use browser control panel</li>



<li>Sold as a subscription service on Telegram</li>
</ul>



<h2 class="wp-block-heading"><strong>Credibility Concerns</strong></h2>



<p>Security analysts say ZeroDayRAT appears to be a real threat, but some details raise questions. In one promotional screenshot, researchers noticed a browser tab labeled “Create USDT Wallet Address,” which looked staged or taken from demo material. This suggests that some features may be exaggerated for marketing.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="1024" height="570" src="https://firsthackersnews.com/wp-content/uploads/2026/02/image-5.png" alt="" class="wp-image-11230" srcset="https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-200x111.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-300x167.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-400x223.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-600x334.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-768x428.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-800x445.png 800w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5.png 1024w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Crypto Wallets and Banking Apps Are Primary Targets (Source: Cyberthint)</figcaption></figure>



<p>Even so, the overall capability of the tool reflects a growing shift in cybercrime. Criminals can now rent advanced surveillance kits that were once limited to highly skilled actors. ZeroDayRAT joins other mobile-focused threats like Anatsa, Arsink, and NFCShare that target banking apps, crypto wallets, and everyday mobile behavior.</p>



<p>As mobile malware continues to evolve, users and organizations must stay cautious. Most infections still begin with simple smishing messages or fake app downloads — proving that even small actions can lead to serious compromise.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/">ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Android Spyware Posing as TV Streaming App Steals Data</title>
		<link>https://firsthackersnews.com/android-spyware-2/</link>
					<comments>https://firsthackersnews.com/android-spyware-2/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 11 Sep 2024 23:23:12 +0000</pubDate>
				<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[android spyware]]></category>
		<category><![CDATA[App Steals Data]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8673</guid>

					<description><![CDATA[<p>Recent research has uncovered new Android Spyware targeting mnemonic keys, vital for cryptocurrency wallet recovery. Disguised as legitimate</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/android-spyware-2/">New Android Spyware Posing as TV Streaming App Steals Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Recent research has uncovered new Android Spyware targeting mnemonic keys, vital for cryptocurrency wallet recovery. Disguised as legitimate apps, the malware scans devices for images containing mnemonic phrases and steals personal data such as text messages, contacts, and images. </p>



<p>Since January 2024, over 280 malicious apps have targeted Korean users, using deceptive tactics like loading screens and redirects to conceal their data theft activities.</p>



<h2 class="wp-block-heading"><strong>All about New Android Spyware </strong></h2>



<p>Malicious actors mainly target Korean mobile users through phishing campaigns, using tactics like impersonating trusted entities to trick victims into clicking malicious links.</p>



<p>When clicked, these links direct users to fake websites that mimic legitimate platforms, tricking them into downloading APK files disguised as harmless apps.</p>



<p>Once installed, these malicious APKs request excessive permissions, allowing them to steal sensitive data and carry out malicious activities in the background.</p>



<p>The malware steals sensitive data from the user’s device, like contacts, SMS messages, photos, and device information, and sends it to a remote server.</p>



<p>It also acts as a remote agent, receiving commands from the server to change settings or send SMS messages.</p>



<p>The investigation found a poorly secured command and control server, exposing victim data such as images and cryptocurrency wallet details, and allowing unauthorized access to index pages and admin panels, revealing the attacker’s operations.</p>



<p>Python and JavaScript were used to process stolen data, with OCR extracting info from images for financial exploitation.</p>



<p>The malware now uses WebSocket connections for real-time C2 communication, making detection harder. It also employs advanced obfuscation techniques like string encoding and code insertion to delay detection.</p>



<p>Targeting has expanded to the UK, showing efforts to broaden its reach.</p>



<p>McAfee reports that the malware, once disguised as loan or government apps, now exploits emotions by mimicking obituary notices, using OCR to analyze stolen data for financial gain.</p>



<p>Though not widespread, its impact grows as deceptive SMS messages are sent to victims&#8217; contacts. Active URLs have been reported for removal. The presence of an &#8220;iPhone&#8221; item in the admin panel suggests a possible iOS variant, stressing caution on all platforms.</p>



<p>Users should avoid installing suspicious apps, be careful with permissions, securely store important data, and use security software.</p>



<h2 class="wp-block-heading">Indicators of Compromise</h2>



<p>IOC&#8217;s as per McAfee</p>



<p>SHA256 Hash(es):</p>



<ul class="wp-block-list">
<li>5b634ac2eecc2bb83c0403edba30a42cc4b564a3b5f7777fe9dada3cd87fd761</li>



<li>4cf35835637e3a16da8e285c1b531b3f56e1cc1d8f6586a7e6d26dd333b89fcf</li>



<li>3d69eab1d8ce85d405c194b30ac9cc01f093a0d5a6098fe47e82ec99509f930d</li>



<li>789374c325b1c687c42c8a2ac64186c31755bfbdd2f247995d3aa2d4b6c1190a</li>



<li>34c2a314dcbb5230bf79e85beaf03c8cee1db2b784adf77237ec425a533ec634</li>



<li>f7c4c6ecbad94af8638b0b350faff54cb7345cf06716797769c3c8da8babaaeb</li>



<li>94aea07f38e5dfe861c28d005d019edd69887bc30dcc3387b7ded76938827528</li>



<li>1d9afa23f9d2ab95e3c2aecbb6ce431980da50ab9dea0d7698799b177192c798</li>



<li>19060263a9d3401e6f537b5d9e6991af637e1acb5684dbb9e55d2d9de66450f2</li>



<li>0ca26d6ed1505712b454719cb062c7fbdc5ae626191112eb306240d705e9ed23</li>



<li>d340829ed4fe3c5b9e0b998b8a1afda92ca257732266e3ca91ef4f4b4dc719f8</li>



<li>149bd232175659434bbeed9f12c8dd369d888b22afaf2faabc684c8ff2096f8c</li>



<li>f9509e5e48744ccef5bfd805938bf900128af4e03aeb7ec21c1e5a78943c72e7</li>



<li>26d761fac1bd819a609654910bfe6537f42f646df5fc9a06a186bbf685eef05b</li>



<li>0e778b6d334e8d114e959227b4424efe5bc7ffe5e943c71bce8aa577e2ab7cdb</li>



<li>8bbcfe8555d61a9c033811892c563f250480ee6809856933121a3e475dd50c18</li>



<li>373e5a2ee916a13ff3fc192fb59dcd1d4e84567475311f05f83ad6d0313c1b3b</li>



<li>7d346bc965d45764a95c43e616658d487a042d4573b2fdae2be32a0b114ecee6</li>



<li>1bff1823805d95a517863854dd26bbeaa7f7f83c423454e9abd74612899c4484</li>



<li>020c51ca238439080ec12f7d4bc4ddbdcf79664428cd0fb5e7f75337eff11d8a</li>
</ul>



<p>Domain(s):</p>



<ul class="wp-block-list">
<li>ahd.lat&nbsp;</li>



<li>allsdy999.org&nbsp;</li>



<li>etr.lat&nbsp;</li>



<li>gf79.org&nbsp;</li>



<li>goodapps.top&nbsp;</li>



<li>gov24.me&nbsp;</li>



<li>gov24.top&nbsp;</li>



<li>krgoodapp.top&nbsp;</li>



<li>krgov24.top&nbsp;</li>



<li>like1902.xyz&nbsp;</li>



<li>make69.info&nbsp;</li>



<li>messtube999.info&nbsp;</li>



<li>mtube888.info&nbsp;</li>



<li>mylove777.org&nbsp;</li>



<li>oktube999.info&nbsp;</li>



<li>top1114.online&nbsp;</li>



<li>ytube888.info&nbsp;</li>
</ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#x200d;Follow Us on:<strong>&nbsp;<a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener">&nbsp;Instagram</a>,&nbsp;<a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong>&nbsp;to get the latest security news!</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/android-spyware-2/">New Android Spyware Posing as TV Streaming App Steals Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/android-spyware-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Predator Spyware leverages &#8220;one-click&#8221; and &#8220;zero-click&#8221; exploits</title>
		<link>https://firsthackersnews.com/predator-spyware/</link>
					<comments>https://firsthackersnews.com/predator-spyware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 06 Sep 2024 16:06:29 +0000</pubDate>
				<category><![CDATA[spyware]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Predator Spyware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8644</guid>

					<description><![CDATA[<p>Recent research shows Predator spyware has resurfaced with improved evasion techniques, despite US sanctions. It&#8217;s still active in</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/predator-spyware/">Predator Spyware leverages &#8220;one-click&#8221; and &#8220;zero-click&#8221; exploits</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Recent research shows Predator spyware has resurfaced with improved evasion techniques, despite US sanctions. It&#8217;s still active in countries like the DRC and Angola, targeting high-profile individuals with harder-to-track infrastructure, highlighting the need for stronger cybersecurity.</p>



<p>Defenders can reduce risks through regular updates, lockdown mode, and mobile device management. International cooperation is key to controlling spyware&#8217;s spread as it continues to evolve.</p>



<h2 class="wp-block-heading"><strong>Predator Spyware </strong></h2>



<p>Predator spyware, linked to Intellexa, has resurfaced after a lull. Despite sanctions, its infrastructure is active again, threatening privacy and security.</p>



<p>Operators of Predator spyware have adopted sophisticated techniques to better conceal their activities, making it increasingly difficult to track and attribute their attacks. This evolution highlights the ongoing challenges in countering advanced spyware threats.</p>



<p>Predator’s capabilities include remote device infiltration and data exfiltration, which allow governments and other entities to secretly monitor citizens and access sensitive information without their knowledge. </p>



<p>The spyware&#8217;s operators have further strengthened their infrastructure by incorporating a new layer of anonymization into their multi-tiered delivery system. This added layer complicates efforts to trace the spyware’s origins and monitor its usage, making it a more elusive and dangerous threat.</p>



<p>While attack methods like &#8220;one-click&#8221; and &#8220;zero-click&#8221; remain the same, Predator&#8217;s more complex infrastructure increases the risk to high-profile individuals. The spyware targets politicians, executives, journalists, and activists, with its high licensing cost suggesting use for strategic purposes.</p>



<p> The European Union is concerned about its misuse, as seen in investigations in Greece and Poland. To reduce the risk, individuals and organizations should focus on regular updates, device reboots, and lockdown mode.</p>



<p>MDM systems secure employee devices, and security training helps protect against social engineering. The spyware market is growing with new, advanced tools despite regulation efforts. Insikt Group&#8217;s investigation into Predator spyware has sparked calls for stricter regulations, but the spyware threat remains until global action is taken.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/predator-spyware/">Predator Spyware leverages &#8220;one-click&#8221; and &#8220;zero-click&#8221; exploits</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/predator-spyware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Meta Warns of 8 Spyware Companies Targeting iOS, Android, and Windows Devices</title>
		<link>https://firsthackersnews.com/meta-warns-8-spyware-firms/</link>
					<comments>https://firsthackersnews.com/meta-warns-8-spyware-firms/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 19 Feb 2024 16:17:23 +0000</pubDate>
				<category><![CDATA[spyware]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[android spyware]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Meta]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[windows devices]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7413</guid>

					<description><![CDATA[<p>Meta Platforms announced it has taken measures to combat malicious activities originating from eight firms in Italy, Spain,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/meta-warns-8-spyware-firms/">Meta Warns of 8 Spyware Companies Targeting iOS, Android, and Windows Devices</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Meta Platforms announced it has taken measures to combat malicious activities originating from eight firms in Italy, Spain, and the United Arab Emirates (UAE) engaged in the surveillance-for-hire industry.</p>



<h2 class="wp-block-heading"><strong>Meta Warns of 8 Spyware Companies</strong></h2>



<p>The findings were reported in Meta&#8217;s Adversarial Threat Report for the fourth quarter of 2023. The spyware targeted iOS, Android, and Windows devices, with capabilities to collect and access a wide range of data, including device information, location, photos and media, contacts, calendar, email, SMS, social media, messaging apps, and enable microphone, camera, and screenshot functionality, the company stated.</p>



<p>The eight companies identified are Cy4Gate/ELT Group, RCS Labs, IPS Intelligence, Variston IT, TrueL IT, Protect Electronic Systems, Negg Group, and Mollitiam Industries.</p>



<p>According to Meta, these firms were involved in scraping, social engineering, and phishing activities targeting various platforms, including Facebook, Instagram, Twitter, YouTube, Skype, GitHub, Reddit, Google, LinkedIn, Quora, Tumblr, VK, Flickr, TikTok, Snapchat, Gettr, Viber, Twitch, and Telegram.</p>



<p><br>A network of fictitious personas linked to RCS Labs, owned by Cy4Gate, reportedly deceived users into providing their phone numbers and email addresses, as well as clicking on bogus links for reconnaissance purposes.</p>



<p>In another instance, Facebook and Instagram accounts linked to Spanish spyware vendor Variston IT were utilized for exploit development and testing, including the dissemination of malicious links. Recent reports indicate that the company is in the process of shutting down its operations.</p>



<p>Meta also reported identifying accounts used by Negg Group to test the delivery of its spyware. Additionally, accounts associated with Mollitiam Industries, a Spanish firm advertising data collection services and spyware targeting Windows, macOS, and Android, were identified for scraping public information.</p>



<p>As countermeasures, the company has introduced new features such as enabling Control Flow Integrity (CFI) on Messenger for Android and implementing VoIP memory isolation for WhatsApp to increase the difficulty of exploitation and reduce the overall attack surface.</p>



<p>Despite these efforts, the surveillance industry continues to thrive in various unexpected forms. Last month, 404 Media, building on previous research from the Irish Council for Civil Liberties (ICCL) in November 2023, uncovered a surveillance tool called Patternz. This tool utilizes real-time bidding (RTB) advertising data gathered from popular apps like 9gag, Truecaller, and Kik to track mobile devices.</p>



<p><br>&#8220;Patternz enables national security agencies to leverage real-time and historical user advertising data to detect, monitor, and predict user actions, security threats, and anomalies based on users&#8217; behavior, location patterns, and mobile usage characteristics, as claimed by ISA, the Israeli company behind the product.</p>



<p>Last week, Enea disclosed a previously unknown mobile network attack called MMS Fingerprint, purportedly used by Pegasus-maker NSO Group. This information was detailed in a 2015 contract between the company and the telecom regulator of Ghana.&#8221;</p>



<p>While the exact method remains somewhat mysterious, the Swedish telecom security firm suspects it likely involves the use of MM1_notification.REQ, a special type of SMS message known as a binary SMS that notifies the recipient device of an MMS waiting for retrieval from the Multimedia Messaging Service Center (MMSC).</p>



<p>The MMS is then fetched via MM1_retrieve.REQ and MM1_retrieve.RES, with the former being an HTTP GET request to the URL address contained in the MM1_notification.REQ message.</p>



<p>What&#8217;s notable about this approach is that user device information such as User-Agent (distinct from a web browser User-Agent string) and x-wap-profile is embedded in the GET request, effectively acting as a fingerprint.</p>



<p>&#8220;The (MMS) User-Agent is a string that typically identifies the OS and device,&#8221; Enea explained. &#8220;x-wap-profile points to a UAProf (User Agent Profile) file that describes the capabilities of a mobile handset.&#8221;</p>



<p>A threat actor seeking to deploy spyware could utilize this information to exploit specific vulnerabilities, tailor malicious payloads to the target device, or even craft more effective phishing campaigns. However, there is no evidence suggesting that this security vulnerability has been exploited in the wild in recent months.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/meta-warns-8-spyware-firms/">Meta Warns of 8 Spyware Companies Targeting iOS, Android, and Windows Devices</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/meta-warns-8-spyware-firms/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Arid Viper target Android users with spyware</title>
		<link>https://firsthackersnews.com/arid-viper-target-android/</link>
					<comments>https://firsthackersnews.com/arid-viper-target-android/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 31 Oct 2023 17:17:58 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[android device]]></category>
		<category><![CDATA[android security]]></category>
		<category><![CDATA[Arid viper]]></category>
		<category><![CDATA[malware variants]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7079</guid>

					<description><![CDATA[<p>The hacking group known as Arid Viper (also identified as APT-C-23, Desert Falcon, or TAG-63) is purportedly responsible</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/arid-viper-target-android/">Arid Viper target Android users with spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The hacking group known as Arid Viper (also identified as APT-C-23, Desert Falcon, or TAG-63) is purportedly responsible for a distribution campaign involving Android spyware. This spyware specifically targets Arabic-speaking users by posing as a fake dating app, and it clandestinely gathers data from compromised devices.</p>



<p>According to Cisco Talos, this malware operates in a stealthy manner, surreptitiously gathering sensitive data from victims&#8217; devices and deploying additional executable files.</p>



<p>Arid Viper hackers have been conducting attacks since 2017 and are associated with cyber activities aligned with the interests of Hamas. The cybersecurity firm reported that there is no evidence linking this campaign to the ongoing Israel-Hamas conflict.</p>



<p>The distribution of the spyware is believed to have started in April 2022.</p>



<p>Notably, the malware exhibits code similarities with a legitimate online dating app named Skipped. This suggests that the operators are either affiliated with the app&#8217;s developers or have attempted to replicate its features to deceive users.</p>



<p>Arid Viper hackers frequently employ seemingly genuine applications to distribute malware. They utilize counterfeit profiles on social media platforms to deceive potential targets into downloading these malicious apps, particularly Android spyware.</p>



<p>Cisco Talos has revealed a sprawling network of companies that are developing dating apps closely resembling or even identical to Skipped. These apps are expected to become available for download from the official Android and iOS app stores in the coming years.</p>



<p>Some of these apps include:</p>



<ol class="wp-block-list"><li>VIVIO – Chat, flirt &amp; Dating (Available on the Apple App Store)</li><li>Meeted (formerly Joostly) – Flirt, Chat &amp; Dating (Available on Apple App Store)</li><li>SKIPPED – Chat, Match &amp; Dating (with 50,000 downloads on Google Play Store)</li><li>Joostly – Dating App! Singles (with 10,000 downloads on Google Play)</li></ol>



<p>After installation, the Android spyware conceals itself on the target device, suppressing system and security notifications, including those with APK package names containing the term &#8220;security&#8221; on Samsung mobile devices and all Android phones.</p>



<p>The spyware requests various permissions, including recording audio and video, accessing contacts, call logs, reading SMS messages, changing Wi-Fi settings, terminating background apps, capturing photos, and generating system notifications.</p>



<p>The malware can collect system data, fetch an updated command-and-control (C2) domain from the current C2 server, and install additional hidden malware within seemingly legitimate apps like Facebook Messenger, Instagram, and WhatsApp.</p>



<h2 class="wp-block-heading"><strong>Protection against spyware</strong></h2>



<p>To safeguard against Android spyware, install reliable antivirus software on your device. These tools can detect and eliminate spyware, preventing potential harm. Select a program from a reputable provider and keep it up to date for ongoing protection.</p>



<p>Additionally, ensure regular updates for your device, as these typically include security enhancements and address known vulnerabilities.</p>



<p>Furthermore, exercise caution when connecting to open Wi-Fi networks. Avoid accessing sensitive data, like banking information or passwords, on public Wi-Fi. If you must log in, employ a VPN to encrypt your connection and safeguard your personal information.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/arid-viper-target-android/">Arid Viper target Android users with spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/arid-viper-target-android/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SpyNote: Android spyware records your calls</title>
		<link>https://firsthackersnews.com/spynote-android-spyware/</link>
					<comments>https://firsthackersnews.com/spynote-android-spyware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 18 Oct 2023 00:46:01 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Android banking trojan]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[malicious link]]></category>
		<category><![CDATA[malware campaign]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[phishing campaign]]></category>
		<category><![CDATA[spynote]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7048</guid>

					<description><![CDATA[<p>Security researchers conducted an analysis of the Android trojan called SpyNote, revealing numerous spyware capabilities associated with it.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/spynote-android-spyware/">SpyNote: Android spyware records your calls</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers conducted an analysis of the Android trojan called SpyNote, revealing numerous spyware capabilities associated with it.</p>



<h2 class="wp-block-heading"><strong>SpyNote: Android spyware</strong></h2>



<p>F-Secure reports that the trojan in question is typically disseminated through SMS phishing campaigns, which entice users to unknowingly download spyware onto their devices by clicking a malicious link embedded within the message.</p>



<p>SpyNote gains access to call logs, camera, SMS messages, and external storage while concealing its presence from both the primary Android screen and the Recents screen, effectively making detection challenging.</p>



<p>&#8220;The SpyNote malware app, as noted by F-Secure researcher Amit Tambe, can be initiated through an external trigger. Subsequently, it initiates its core malicious activities. Most notably, it actively seeks accessibility permissions, aiming to acquire additional privileges, including audio and telephone call recording permissions, keystroke logging capabilities, and the ability to capture screenshots of the phone through the MediaProjection API.&#8221;</p>



<p>A detailed examination of the malware by F-Secure uncovered the existence of so-called &#8220;diehard services,&#8221; which create complications when attempting to terminate the spyware, whether it&#8217;s the victims or the operating system itself trying to do so.</p>



<p>&#8220;The SpyNote sample is spyware that captures and pilfers a range of information, encompassing keystrokes, call logs, data regarding installed applications, and more,&#8221; Tambe explained. &#8220;It lurks discreetly on the victim&#8217;s device, evading easy detection and rendering the uninstallation process exceptionally challenging.&#8221;</p>



<p>The victim will be forced to do&nbsp;<strong>restore factory settings</strong>, thus losing all its other data.</p>



<p>Spyware presents multiple hazards, and it is imperative to comprehend its implications and implement protective measures. Among the foremost concerns linked to spyware are the invasion of privacy and the risk of data breaches.</p>



<p>Spyware poses a significant threat to our privacy as it stealthily infiltrates our devices, potentially harvesting critical personal and financial data that can subsequently be exploited for further malicious activities.</p>



<p>Beyond the privacy concerns, spyware can result in more extensive data breaches, encompassing personal and financial information, confidential corporate data, and other sensitive content. When this data is exposed, it can trigger substantial financial losses, disrupt trust and transparency, and potentially jeopardize national security.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/spynote-android-spyware/">SpyNote: Android spyware records your calls</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/spynote-android-spyware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Chinese APT Uses Fake Messenger Apps to Spy on Android Users</title>
		<link>https://firsthackersnews.com/badbazaar-spyware/</link>
					<comments>https://firsthackersnews.com/badbazaar-spyware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 01 Sep 2023 16:17:01 +0000</pubDate>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[badbazaar]]></category>
		<category><![CDATA[badbazaar spyware]]></category>
		<category><![CDATA[infected users]]></category>
		<category><![CDATA[malicious code]]></category>
		<category><![CDATA[malware variants]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[signal]]></category>
		<category><![CDATA[telegram app]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[trojanized applications]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=6887</guid>

					<description><![CDATA[<p>In the coming years, Signal&#8217;s applications became compromised, while Telegram, containing the BadBazaar spyware, was uploaded to Google</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/badbazaar-spyware/">Chinese APT Uses Fake Messenger Apps to Spy on Android Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In the coming years, Signal&#8217;s applications became compromised, while Telegram, containing the BadBazaar spyware, was uploaded to Google Play and Samsung Galaxy Store by the Chinese hacking group known as GREF.</p>



<p>In the past, this malware was employed to target ethnic minorities in China. However, ESET reports a shift in focus, with attackers now aiming at users in countries including Ukraine, Poland, the Netherlands, Spain, Portugal, Germany, Hong Kong, and the United States.</p>



<h2 class="wp-block-heading"><strong>BadBazaar spyware</strong></h2>



<p>The BadBazaar spyware boasts a range of capabilities, such as pinpointing the device&#8217;s precise location, pilfering files, recording calls and SMS messages, capturing phone conversations, acquiring photos from the camera, and absconding with contact lists, files, or databases.</p>



<p>The trojanized applications containing the BadBazaar malicious code were discovered by ESET researcher,&nbsp;<strong>Lukas Stefanko</strong>.</p>



<p>The Chinese team has introduced two apps named &#8220;Signal Plus Messenger&#8221; and &#8220;FlyGram,&#8221; which are modified versions of the popular open-source instant messaging apps Signal and Telegram.</p>



<p>Interestingly, hackers have established dedicated websites, &#8220;signalplus[.]org&#8221; and &#8220;flygram[.]org,&#8221; to enhance the legitimacy of these apps. These websites provide links for installing the apps either from Google Play or directly from the site.</p>



<p>According to ESET, the FlyGram app is designed to target sensitive data, including contact lists, call logs, Google accounts, and WiFi data. Additionally, it features a hazardous backup function that transmits Telegram communication data to a server under the control of the attackers.</p>



<p>Examination of the available data reveals that a minimum of 13,953 FlyGram users have activated the backup feature. Nevertheless, the precise user count for the spyware application remains unknown.</p>



<p>On the other hand, the Signal clone collects similar information, but focuses more on extracting information related to Signal, such as&nbsp;<strong>victim&#8217;s communications and the PIN protecting their account&nbsp;</strong>from unauthorized access.</p>



<p>However, the fake Signal app includes a feature that makes it&nbsp;attack&nbsp;more interesting as it allows the attacker to&nbsp;<strong>link a victim&#8217;s Signal accounts to devices controlled by them</strong>&nbsp;(the invaders). So they can see future messages.</p>



<p>Signal offers a QR-code-based feature enabling multiple devices to connect to a single account, allowing messages to be accessible from all connected devices.</p>



<p>Signal Plus Messenger with BadBazaar spyware exploits this feature by automatically linking its devices to victims&#8217; Signal accounts, bypassing the QR-code process without their knowledge. This enables attackers to monitor all future messages sent from the Signal account.</p>



<p>The spyware discreetly establishes a connection between the victim&#8217;s smartphone and the attacker&#8217;s device, allowing the attacker to eavesdrop on Signal communications without the victim&#8217;s awareness.</p>



<p>ESET has reported that this method of spying on Signal has been employed previously, as it is the sole means of accessing the message content.</p>



<p>To determine if someone has accessed your Signal account, launch the official Signal app, navigate to Settings, and select &#8220;Linked Devices&#8221; to inspect and oversee all connected devices.</p>



<h2 class="wp-block-heading"><strong>Mitigation</strong></h2>



<p>For Android users, it is strongly recommended to utilize the official Signal and Telegram versions to ensure their safety from potential risks. </p>



<p>Spyware infections can result in significant breaches of user privacy and security, underscoring the importance of prevention and early detection measures.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/badbazaar-spyware/">Chinese APT Uses Fake Messenger Apps to Spy on Android Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/badbazaar-spyware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Android apps with SpinOk spyware module installed over 421,000K times</title>
		<link>https://firsthackersnews.com/android-apps-with-spinok-spyware/</link>
					<comments>https://firsthackersnews.com/android-apps-with-spinok-spyware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 30 May 2023 23:07:06 +0000</pubDate>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[infostealer]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[android apps]]></category>
		<category><![CDATA[android security]]></category>
		<category><![CDATA[android spyware]]></category>
		<category><![CDATA[C&C server]]></category>
		<category><![CDATA[command and control]]></category>
		<category><![CDATA[mobile security]]></category>
		<category><![CDATA[spinkOk]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=6469</guid>

					<description><![CDATA[<p>A new Android malware – SpinOk – distributed as an advertisement SDK has been discovered in several apps</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/android-apps-with-spinok-spyware/">Android apps with SpinOk spyware module installed over 421,000K times</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new <a href="https://firsthackersnews.com/android-trojan-dogerat/">Android malware</a> – SpinOk – distributed as an advertisement SDK has been discovered in several apps – many of which were previously listed on Google Play and have been downloaded a total of over 400 million times.</p>



<h2 class="wp-block-heading"><strong>SpinOk spyware?</strong></h2>



<p><a href="https://firsthackersnews.com/android-trojan-dogerat/">Android</a>.Spy.SpinOk module is designed to engage users with mini games, tasks, and alleged prizes, but it also contains spyware functionality. When initialized, the trojan SDK connects to a command and control (C&amp;C) server and sends a request containing technical information about the infected device. This information includes data from sensors like the gyroscope and magnetometer, which can be used to detect emulator environments and adjust the module&#8217;s behavior to avoid detection by security researchers.</p>



<p> The module also ignores device proxy settings to hide network connections during analysis. In response, it receives a list of URLs from the server, which are opened in WebView to display advertising banners.</p>



<h2 class="wp-block-heading" id="h-capabilities-of-trojan-sdk"><strong>Capabilities of <a href="https://firsthackersnews.com/new-qbot-banking-trojan/">Trojan</a> SDK</strong></h2>



<ul class="wp-block-list"><li>obtain the list of files in specified directories,</li><li>verify the presence of a specified file or a directory on the device,</li><li>obtain a file from the device, and</li><li>copy or substitute the clipboard contents.</li></ul>



<p>Dr. Web claims that this SDK was found in 101 apps that were downloaded a total of 421.290.300 times from Google Play, with the most downloads listed below:</p>



<ul class="wp-block-list"><li>Noizz (100,000,000 downloads)</li><li>Zapya (100,000,000 downloads)</li><li>VFly (50,000,000 downloads)</li><li>MVBit (50,000,000 downloads)</li><li>Biugo (50,000,000 downloads)</li><li>Crazy Drop (10,000,000 downloads)</li><li>Cashzine (10,000,000 downloads)</li><li>Fizzo Novel (10,000,000 downloads)</li><li>CashEM: Get Rewards (5,000,000 downloads)</li><li>Tick: watch to earn (5,000,000 downloads)</li></ul>



<p>It is recommended to uninstall the app immediately and scan your device.</p>



<h2 class="wp-block-heading"><strong>How to stay safe from bad apps</strong></h2>



<p>1. Avoid Installing Apps From Unknown Sources</p>



<p>2. Avoid Third-Party App Stores</p>



<p>3. Cross-Check App Permissions With AppBrain</p>



<p>4. Review the App Listing Page</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/android-apps-with-spinok-spyware/">Android apps with SpinOk spyware module installed over 421,000K times</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/android-apps-with-spinok-spyware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
