Tag: android
-
iPhone Android Users: A Major Privacy Upgrade is Coming Soon
This breakthrough will finally allow secure, encrypted messaging between different mobile platforms. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-iphone-android-encrypted-messaging/
-
BadBox 2.0 – Eine Million Android-Geräte mit vorinstallierter Malware ausgeliefert
First seen on security-insider.de Jump to article: www.security-insider.de/badbox-2-malware-auf-android-geraeten-a-b7893e69dd61db58f22c914d108f946e/
-
Scammers Sneak 300+ Ad Fraud Apps onto Google Play with 60M Downloads
Google Play Store hit by 300+ fake Android apps, downloaded more than 60 million times pushing ad fraud and data theft. Learn how to spot and remove these threats. First seen on hackread.com Jump to article: hackread.com/scammers-ad-fraud-apps-google-play-60m-downloads/
-
Malicious Android ‘Vapor’ apps on Google Play installed 60 million times
Over 300 malicious Android applications downloaded 60 million items from Google Play acted as adware or attempted to steal credentials and credit card information. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/malicious-android-vapor-apps-on-google-play-installed-60-million-times/
-
Hacker streuen über 330 bösartige Apps in Google-Play-Kampagnen
Hacker haben in einer Malware-Kampagne mindestens 331 bösartige Apps angeboten, die auf Google-Play gehostet werden so eine aktuelle Analyse der Bitdefender Labs. Bis jetzt kam es weltweit zu rund 60 Millionen Downloads. Die Cyberkriminellen umgehen dabei Sicherheitsregeln von Android und sind nach dem Download auf dem Gerät für den Nutzer nicht sichtbar. Andere bösartige…
-
Android-Geräte und die BadBox-Malware
Android-Geräte werden durch eine als BadBox bezeichnete Malware bedroht. Sicherheitsforscher haben Anfang März 2025 ein Botnetz mit 500.000 infizierten Geräten von dieser Malware befreit. Android-Geräte durch BadBox-Malware bedroht Ich hatte im Dezember 2024 im Blog-Beitrag BadBox: BSI warnt vor Malware auf … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/03/18/android-geraete-und-die-badbox-malware/
-
Analyze Mobile Threats Faster: ANY.RUN Introduces Android OS to Its Interactive Sandbox
Disclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings. First seen on hackread.com Jump to article: hackread.com/analyze-mobile-threats-any-run-android-os-sandbox/
-
DocSwap Malware Masquerades as Security Document Viewer to Attack Android Users Worldwide
The cybersecurity landscape has witnessed a new threat with the emergence of the DocSwap malware, which disguises itself as a >>Document Viewing Authentication App
-
Large-Scale Malicious App Campaign Bypassing Android Security
Bitdefender said the malicious app campaign has resulted in more than 60 million downloads of malicious apps from the Google Play Store First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/malicious-app-bypass-android/
-
BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse
At least four different threat actors have been identified as involved in an updated version of a massive ad fraud and residential proxy scheme called BADBOX, painting a picture of an interconnected cybercrime ecosystem.This includes SalesTracker Group, MoYu Group, Lemon Group, and LongTV, according to new findings from the HUMAN Satori Threat Intelligence and Research…
-
iPhone-Android: A Major Privacy Upgrade is Coming Soon
This breakthrough will finally allow secure, encrypted messaging between different mobile platforms. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-iphone-android-encrypted-messaging/
-
Android Malware Disguised as DeepSeek Steals Users’ Login Credentials
A recent cybersecurity threat has emerged in the form of Android malware masquerading as the DeepSeek AI application. This malicious software is designed to deceive users into downloading a fake version of the DeepSeek app, which then compromises their device’s security by stealing sensitive information such as login credentials. Malware Propagation and Installation The malware…
-
Chinese Group Spreads Android Spyware via Trojan Signal, Telegram Apps
Thousands of devices have become infected with BadBazaar, malware previously used to spy on Uyghur and Turkic ethnic minorities in China. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/china-group-spreads-android-spyware-via-trojan-signal-telegram-apps
-
EndEnd Encrypted Texts Between Android and iPhone Are Coming
Plus: A nominee to lead CISA emerges, Elon Musk visits the NSA, a renowned crypto cracking firm’s secret (and problematic) cofounder is revealed, and more. First seen on wired.com Jump to article: www.wired.com/story/end-to-end-encryption-android-ios-roundup/
-
Google slips built-in terminal, Debian Linux VM into Android 15 March feature drop
Try it out now on Pixel phones for some penguin on penguin fun First seen on theregister.com Jump to article: www.theregister.com/2025/03/13/android_15_linux_debian_terminal/
-
RCS: Ende-zu-Ende-Verschlüsselung zwischen iOS und Android
Mit RCS Universal Profile 3.0 ist E2EE Teil des RCS-Standards. Ein wichtiger Schritt für die Sicherheit plattformübergreifender Nachrichten. First seen on golem.de Jump to article: www.golem.de/news/rcs-ende-zu-ende-verschluesselung-zwischen-ios-und-android-2503-194325.html
-
GSMA Confirms EndEnd Encryption for RCS, Enabling Secure Cross-Platform Messaging
The GSM Association (GSMA) has formally announced support for end-to-end encryption (E2EE) for securing messages sent via the Rich Communications Services (RCS) protocol, bringing much-needed security protections to cross-platform messages shared between Android and iOS platforms.To that end, the new GSMA specifications for RCS include E2EE based on the Messaging Layer Security (MLS) protocol First…
-
The most notorious and damaging ransomware of all time
Tags: access, android, attack, backdoor, backup, banking, botnet, breach, communications, computer, control, credentials, cryptography, cyber, cybercrime, dark-web, data, defense, detection, email, encryption, endpoint, exploit, extortion, finance, flaw, framework, germany, google, government, group, hacker, hacking, healthcare, infection, infrastructure, international, jobs, korea, law, lazarus, leak, linux, malicious, malware, microsoft, mobile, msp, network, north-korea, office, open-source, oracle, password, phishing, phone, powershell, ransom, ransomware, russia, service, software, spam, switch, technology, threat, tool, ukraine, update, usa, virus, vulnerability, windowsConti: History: First appearing in May 2020, the Conti RaaS platform is considered the successor to the Ryuk ransomware. As of January 2021, Conti is believed to have infected over 150 organizations and earned millions of dollars for its criminal developers and their affiliates. At least three new versions have been found since its inception.How it works: Conti uses the…
-
Android von installierten (Tracking-)Diensten wie SafetyCore befreien
Google hat in den letzten Wochen und Monaten einige neue Dienste und Apps auf Android-Geräten installiert. So gibt es plötzlich eine SafetyCore-Funktion, eine Android System Intelligence und mehr. Nachfolgend eine kleine Übersicht, um ggf. solche ungewollten Funktion loszuwerden. Ein Artikel über … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/03/14/android-von-installierten-diensten-befreien/
-
Android spyware ‘KoSpy’ spread by suspected North Korean APT
First seen on scworld.com Jump to article: www.scworld.com/news/android-spyware-kospy-spread-by-suspected-north-korean-apt
-
Breach Roundup: The Ivanti Patch Treadmill
Also: Patch Tuesday, Equalize Scandal Figure Dies and Polymorphic Extension Attack. This week, Ivanti EPM customers should patch, Patch Tuesday, fake web browser extensions, North Korean Android malware, a key figure in Italy’s Equalize scandal dead of heart attack. Also, Apache Camel flaw, OpenAI’s agent automates phishing and Apple patched another zero day. First seen…
-
North Korea-linked APT group ScarCruft spotted using new Android spyware KoSpy
North Korea-linked APT group ScarCruft used a new Android spyware dubbed KoSpy to target Korean and English-speaking users. North Korea-linked threat actor ScarCruft (aka APT37, Reaper, and Group123) is behind a previously undetected Android surveillance tool named KoSpy that was used to target Korean and English-speaking users. ScarCruft has been active since at least 2012, it made the…
-
North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps
The North Korea-linked threat actor known as ScarCruft is said to have been behind a never-before-seen Android surveillance tool named KoSpy targeting Korean and English-speaking users.Lookout, which shared details of the malware campaign, said the earliest versions date back to March 2022. The most recent samples were flagged in March 2024. It’s not clear how…
-
North Korean Hackers Distributed Android Spyware via Google Play
The North Korea-linked APT37 has been observed targeting Android users with spyware distributed via Google Play. The post North Korean Hackers Distributed Android Spyware via Google Play appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/north-korean-hackers-distributed-android-spyware-via-google-play/
-
Suspected North Korea Group Targets Android Devices with Spyware
A North Korea-backed threat group, APT37, disguised KoSpy as utility apps in Google Play to infect Android devices, using the spyware for such activities as gathering sensitive information, tracking locations, capturing screenshots, recording keystrokes, and accessing files. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/suspected-north-korea-group-targets-android-devices-with-spyware/
-
North Korean Hackers Use Google Play Malware to Steal SMS, Calls Screenshots
Cybersecurity researchers at Lookout Threat Lab have uncovered a sophisticated Android surveillance tool dubbed >>KoSpy,
-
Android apps laced with North Korean spyware found in Google Play
Google’s Firebase platform also hosted configuration settings used by the apps. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/03/researchers-find-north-korean-spy-apps-hosted-in-google-play/
-
New North Korean Android spyware slips onto Google Play
A new Android spyware named ‘KoSpy’ is linked to North Korean threat actors who have infiltrated Google Play and third-party app store APKPure through at least five malicious apps. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-north-korean-android-spyware-slips-onto-google-play/
-
Spyware in bogus Android apps is attributed to North Korean group
A North Korean nation-state group tracked as APT37 or ScarCruft placed infected utilities in Android app stores as part of an espionage campaign, according to researchers at Lookout. First seen on therecord.media Jump to article: therecord.media/north-korea-malware-android-apps-kospy-apt37-scarcruft

