Tag: android
-
Malware Attacks on Android Devices Surge in Q2, Driven by Banking Trojans and Spyware
Dr.Web Security Space for mobile devices reported that malware activity on Android devices increased significantly in the second quarter of 2025. Adware trojans, particularly from the Android.HiddenAds family, remained the most prevalent threat, despite an 8.62% decrease in user encounters. These trojans often disguise themselves as harmless apps or hide within system directories, concealing their…
-
Qwizzserial Android Malware Masquerades as Legit Apps to Steal Banking Data and Intercept 2FA SMS
A new and alarming Android malware family, dubbed Qwizzserial, has emerged as a significant threat, particularly targeting users in Uzbekistan. Discovered by Group-IB in March 2024, this SMS stealer is designed to intercept two-factor authentication (2FA) codes and steal sensitive banking information, posing a severe risk to personal and financial security. Disguised as legitimate applications…
-
Malware Surge Hits Android: Adware, Trojans and Crypto Theft Lead Q2 Threats
Dr.Web reports Android malware surge in Q2 with adware, banking trojans and crypto theft hidden in fake apps, firmware and spyware targeting users. First seen on hackread.com Jump to article: hackread.com/android-malware-adware-trojan-crypto-theft-q2-threats/
-
Aegis Authenticator: Free, open-source 2FA app for Android
Aegis Authenticator is an open-source 2FA app for Android that helps you manage login codes for your online accounts. The app features strong encryption and the ability to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/07/aegis-2fa-authenticator-free-open-source-android/
-
Android-Smartphones: Bedrohungen nehmen sprunghaft zu
Tags: androidFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/android-smartphones-bedrohungen-zunahme-sprunghaft
-
Android May Soon Warn You About Fake Cell Towers
Plus: Iran-linked hackers threaten to release Trump campaign emails, Chinese hackers still in US telecoms networks, and an abusive deepfake website plans an expansion. First seen on wired.com Jump to article: www.wired.com/story/android-may-soon-warn-you-about-fake-cell-towers/
-
Google fined $314M for misusing idle Android users’ data
Google must pay $314M after a California court ruled it misused idle Android users’ data. The case ends a class-action suit filed in August 2019. A San Jose jury ruled that Google misused Android users’ cell phone data and must pay over $314.6 million in damages to affected users in California. Google is liable for…
-
Massive Android Ad Fraud ‘IconAds’ Uses Google Play to Target and Exploit Users
HUMAN’s Satori Threat Intelligence and Research Team has dismantled a sprawling ad fraud operation named IconAds, which infiltrated the Google Play Store with 352 malicious apps. At its peak, this scheme generated a staggering 1.2 billion bid requests daily, flooding users’ screens with out-of-context ads while employing cunning tactics to hide app icons and obscure…
-
A flaw in Catwatchful spyware exposed logins of +62,000 users
A flaw in Catwatchful spyware exposed logins of 62,000 users, turning the spy tool into a data leak, security researcher Eric Daigle revealed. A flaw in the Catwatchful Android spyware exposed its full user database, leaking email addresses and plaintext passwords of both customers and its admin, TechCrunch first reported. Security researcher Eric Daigle first discovered…
-
Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
Google has been ordered by a court in the U.S. state of California to pay $314 million over charges that it misused Android device users’ cellular data when they were idle to passively send information to the company.The verdict marks an end to a legal class-action complaint that was originally filed in August 2019.In their…
-
A flaw in Catwatchful spyware exposed logins of +62,000 users
A flaw in Catwatchful spyware exposed logins of 62,000 users, turning the spy tool into a data leak, security researcher Eric Daigle revealed. A flaw in the Catwatchful Android spyware exposed its full user database, leaking email addresses and plaintext passwords of both customers and its admin, TechCrunch first reported. Security researcher Eric Daigle first discovered…
-
Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
Google has been ordered by a court in the U.S. state of California to pay $314 million over charges that it misused Android device users’ cellular data when they were idle to passively send information to the company.The verdict marks an end to a legal class-action complaint that was originally filed in August 2019.In their…
-
Catwatchful Android Spyware Leaks Credentials of 62,000+ Users
A major security lapse has exposed the credentials of over 62,000 users of Catwatchful, a full-featured Android spyware app that openly markets itself as a tool for covert surveillance. The breach, discovered by a security researcher, highlights the persistent risks posed by stalkerware and the dangers of storing sensitive user data without adequate safeguards. Catwatchful…
-
Leaks hint at Operator-like tool in ChatGPT ahead of GPT-5 launch
A few new code references in the ChatGPT web app and Android point to an Operator-like tool in GPT’s chain of thoughts. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/artificial-intelligence/leaks-hint-at-operator-like-tool-in-chatgpt-ahead-of-gpt-5-launch/
-
Almost 100K Android devices compromised in Qwizzerial Android malware campaign
First seen on scworld.com Jump to article: www.scworld.com/brief/almost-100k-android-devices-compromised-in-qwizzerial-android-malware-campaign
-
Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
A mobile ad fraud operation dubbed IconAds that consisted of 352 Android apps has been disrupted, according to a new report from HUMAN.The identified apps were designed to load out-of-context ads on a user’s screen and hide their icons from the device home screen launcher, making it harder for victims to remove them, per the…
-
California jury orders Google to pay $314 million over data transfers from Android phones
Google’s data transfers from idle Android phones on cellular networks essentially amounted to stealing, lawyers alleged in a class-action case where a jury awarded $314 million to plaintiffs. Google said it will appeal. First seen on therecord.media Jump to article: therecord.media/google-lawsuit-data-collection-android-cellular
-
Android SMS Stealer Infects 100,000 Devices in Uzbekistan
New Android malware Qwizzserial has infected 100,000 devices, primarily in Uzbekistan, stealing SMS data via Telegram distribution First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/android-sms-stealer-100000/
-
Malware in Apps: Godfather 2.0 für Android; SparkKitty in App-Stores
Kleiner Sammelbeitrag rund um das Thema Smartphone-Apps mit Malware an Bord. Aktuell feiert die Android-Malware Godfather 2.0 ihr Comeback bzw. Erfolge beim Raubzügen beim Online-Banking. Zudem haben Sicherheitsforscher von Kaspersky den SparkKitty-Trojaner in Apps aus App-Stores gefunden. Android-Malware Godfather 2.0 … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/06/30/malware-in-apps-godfather-2-0-fuer-android-sparkkitty-in-app-stores/
-
Imsi-Catcher: Android 16 soll vor Fake-Mobilfunkstationen warnen
Tags: androidAndroid 16 hat eine Funktion, um Nutzer vor Imsi-Catchern zu warnen, über die Telefonate abgehört und Standorte bestimmt werden können. First seen on golem.de Jump to article: www.golem.de/news/imsi-catcher-android-16-soll-vor-fake-mobilfunkstationen-warnen-2506-197584.html
-
Stealthy EagleSpy v5 Android malware emerges
First seen on scworld.com Jump to article: www.scworld.com/brief/stealthy-eaglespy-v5-android-malware-emerges
-
Beware of Weaponized Wedding Invite Scams Delivering SpyMax RAT to Android Devices
A sophisticated Android phishing campaign, aptly named “Wedding Invitation,” has emerged as a significant threat targeting mobile users across India. According to a detailed report from K7 Computing, this malicious operation leverages the guise of digital wedding invitations to deceive unsuspecting users into installing compromised APK files. Stealthy Phishing Campaign Distributed primarily through popular messaging…
-
Weiteres Update-Debakel: Android TV 14 für Chromecast mit Google TV erneut fehlerhaft
Google verteilt eine fehlerkorrigierte Version von Android TV 14 für Chromecast mit Google TV. Das Update hat diesmal andere Fehler. First seen on golem.de Jump to article: www.golem.de/news/weiteres-update-debakel-android-tv-14-fuer-chromecast-mit-google-tv-erneut-fehlerhaft-2506-197457.html
-
EagleSpy v5 RAT Promoted by Hacker for Stealthy Android Access
A notorious threat actor known as >>xperttechy
-
SparkKitty Swipes Pics From iOS, Android Devices
Like its predecessor, SparkCat, the new malware appears to be going after sensitive data, such as seed phrases for cryptocurrency wallets, in device photo galleries. First seen on darkreading.com Jump to article: www.darkreading.com/mobile-security/sparkkitty-swipes-pics-ios-android-devices
-
Malware on Google Play, Apple App Store stole your photos”, and crypto
A new mobile crypto-stealing malware called SparkKitty was found in apps on Google Play and the Apple App Store, targeting Android and iOS devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/malware-on-google-play-app-store-stole-your-photos-and-crypto/
-
SparkKitty Targets iOS and Android Devices via App Store and Google Play Attacks
A sophisticated spyware campaign, dubbed SparkKitty, has emerged as a significant threat to both iOS and Android users, infiltrating even the official app stores like Google Play and the App Store. First detected in connection with the earlier SparkCat campaign from January 2025, which targeted crypto wallet seed phrases, SparkKitty has since evolved into a…
-
Security Affairs newsletter Round 529 by Pierluigi Paganini INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Iran confirmed it shut down internet to protect the country against cyberattacks Godfather Android trojan uses…
-
Godfather 2.0: Android-Malware nutzt Virtualisierung für Banking-Raubzüge in Echtzeit
Godfather 2.0 kapert Banking-Apps per Android-Virtualisierung. Neue Malware-Variante ermöglicht Echtzeit-Diebstahl trotz echter UI. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/it-sicherheit/malware/godfather-2-0-android-malware-nutzt-virtualisierung-fuer-banking-raubzuege-in-echtzeit-316912.html
-
Godfather Android trojan uses virtualization to hijack banking and crypto apps
Godfather Android trojan uses virtualization to hijack banking and crypto apps, stealing user funds, warns mobile security firm Zimperium. Zimperium zLabs has uncovered a major evolution of the GodFather Android trojan, which uses on-device virtualization to hijack real banking and crypto apps. Instead of using fake overlays, the malware creates a sandbox on the victim’s…

