Tag: android
-
Honor ändert Strategie: Sieben Jahre Android-Updates nur für Oberklasse-Smartphones
Für die meisten Smartphone-Modelle von Honor gelten noch die alten Regeln: Die Geräte erhalten deutlich kürzer Android-Updates. First seen on golem.de Jump to article: www.golem.de/news/honor-aendert-strategie-sieben-jahre-android-updates-nur-fuer-oberklasse-smartphones-2503-193864.html
-
Vo1d Botnet’s Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries
Brazil, South Africa, Indonesia, Argentina, and Thailand have become the targets of a campaign that has infected Android TV devices with a botnet malware dubbed Vo1d.The improved variant of Vo1d has been found to encompass 800,000 daily active IP addresses, with the botnet scaling a peak of 1,590,299 on January 19, 2025, spanning 226 countries.…
-
Serbian student’s Android phone compromised by exploit from Cellebrite
Android users who haven’t installed Google’s February patch batch should do so ASAP. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/02/android-0-day-sold-by-cellebrite-exploited-to-hack-serbian-students-phone/
-
Android 0-day sold by Cellebrite exploited to hack Serbian student’s phone
Android users who haven’t installed Google’s February patch batch should do so ASAP. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/02/android-0-day-sold-by-cellebrite-exploited-to-hack-serbian-students-phone/
-
Over 500K Android, iOS, iPadOS devices impacted by Spyzie stalkerware
Tags: androidFirst seen on scworld.com Jump to article: www.scworld.com/brief/over-500k-android-ios-ipados-devices-impacted-by-spyzie-stalkerware
-
Nearly 1.6M Android TVs compromised by Vo1d malware botnet
First seen on scworld.com Jump to article: www.scworld.com/brief/nearly-1-6m-android-tvs-compromised-by-vo1d-malware-botnet
-
Over 500K Android, iOS, iPadOS, Devices Impacted By Spyzie Stalkerware
Tags: androidFirst seen on scworld.com Jump to article: www.scworld.com/brief/over-500k-android-ios-ipados-devices-impacted-by-spyzie-stalkerware
-
Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist
Amnesty International on Friday released technical details on zero-day vulnerabilities exploited by Cellebrite’s mobile forensic tools to spy on a Serbian student activist. The investigation, which builds on a December 2024 report, found evidence that authorities in Serbia used the Cellebrite UFED system to bypass the lock screen on an Android device. The privacy rights…
-
Researchers uncover unknown Android flaws used to hack into a student’s phone
Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On Friday, Amnesty International published a report detailing a chain of three zero-day vulnerabilities developed by phone-unlocking company Cellebrite, which its researchers found after investigating the hack of a student protester’s phone in Serbia. The…
-
Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone
A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International.”The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite,” the international non-governmental…
-
Serbian police used Cellebrite zero-day hack to unlock Android phones
Serbian authorities have reportedly used an Android zero-day exploit chain developed by Cellebrite to unlock the device of a student activist in the country and attempt to install spyware. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/serbian-police-used-cellebrite-zero-day-hack-to-unlock-android-phones/
-
Enhanced capabilities sustain the rapid growth of Vo1d botnet
Operators behind the Vo1d botnet have enhanced its capabilities, enabling rapid growth in recent months. In September 2024, Doctor Web researchers uncovered a malware, tracked asVo1d, that infected nearly 1.3 million Android-based TV boxes belonging to users in 197 countries. The malicious code acts as a backdoor allowing attackers to download and install third-party software…
-
Malware auf Android-TV-Boxen: Vo1d-Botnetz wächst auf 1,6 Millionen Geräte
300.000 neue Zombies hat die Vo1d-Malware auf Android-Boxen rekrutiert aber nur bestimmte Geräte sind betroffen. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/it-sicherheit/malware/malware-auf-android-tv-boxen-vo1d-botnetz-waechst-auf-16-millionen-geraete-310902.html
-
Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes
The Vo1d botnet is now powered by 1.6 million Android TV devices, up from 1.3 million half a year ago. The post Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/vo1d-botnet-evolves-as-it-ensnares-1-6-million-android-tv-boxes/
-
Riesiges Botnetz steuert 1,6 Millionen TV-Geräte
Auch Deutschland steuert Zehntausende von Geräten bei. Forscher sehen in dem Botnetz ein enormes Potenzial für verheerende Cyberangriffe. First seen on golem.de Jump to article: www.golem.de/news/android-riesiges-botnetz-steuert-1-6-millionen-tv-geraete-2502-193816.html
-
Vo1d malware botnet grows to 1.6 million Android TVs worldwide
A new variant of the Vo1d malware botnet has grown to 1,590,299 infected Android TV devices across 226 countries, recruiting devices as part of anonymous proxy server networks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/vo1d-malware-botnet-grows-to-16-million-android-tvs-worldwide/
-
Malware per FakeUpdate
Gefälschte Browser-Updates zielen aktuell auf Mac-, Windows- und Android-Nutzer ab und verbreiten Malware wie FrigidStealer, Lumma Stealer und Marcher-Trojaner über kompromittierte Websites. First seen on 8com.de Jump to article: www.8com.de/cyber-security-blog/malware-per-fake-browser-update
-
Android App-Masquerading Malware Racks Up Over 100K Downloads
First seen on scworld.com Jump to article: www.scworld.com/brief/android-app-masquerading-malware-racks-up-over-100k-downloads
-
TgToxic Android Malware Updated it’s Features to Steal Login Credentials
The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing its ability to steal login credentials and financial data. Originally targeting Southeast Asian users through phishing campaigns and deceptive apps, the malware has now evolved to include advanced features and expanded its geographical scope to Europe and Latin America. Researchers have…
-
LightSpy Malware Expands With 100+ Commands to Target Users Across All Major OS Platforms
The LightSpy surveillance framework has significantly evolved its operational capabilities, now supporting over 100 commands to infiltrate Android, iOS, Windows, macOS, and Linux systems, and routers, according to new infrastructure analysis. First documented in 2020, this modular malware has shifted from targeting messaging applications to focusing on social media database extraction and cross-platform surveillance, marking…
-
Android App on Google Play Targets Indian Users to Steal Login Credentials
A malicious Android application, Finance Simplified (package: com.someca.count), has been identified on the Google Play Store, targeting Indian users under the guise of a financial management tool. The app, which claims to offer an EMI calculator, is instead a sophisticated malware platform facilitating predatory lending, data theft, and extortion. Rapid Spread and Exploitative Practices The…
-
SIO linked to Android malware disguised as popular apps
First seen on scworld.com Jump to article: www.scworld.com/brief/sio-linked-to-android-malware-disguised-as-popular-apps
-
SpyLend Android malware downloaded 100,000 times from Google Play
An Android malware app called SpyLend has been downloaded over 100,000 times from Google Play, where it masqueraded as a financial tool but became a predatory loan app for those in India. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/spylend-android-malware-downloaded-100-000-times-from-google-play/
-
Russian cyberespionage groups target Signal users with fake group invites
QR codes provide a means of phishing Signal users: These features now work by scanning QR codes that contain the cryptographic information needed to exchange keys between different devices in a group or to authorize a new device to an account. The QR codes are actually representations of special links that the Signal application knows…
-
Enigma Messenger seit Mitte Januar offline
Tags: androidSchon seit rund sechs Wochen funktioniert der Enigma Messenger, eine Android App mit dem Fokus auf Datenschutz, nicht mehr. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/it-sicherheit/datenschutz/enigma-messenger-seit-mitte-januar-offline-310483.html
-
New FrigidStealer Malware Targets macOS Users via Fake Browser Updates
Cybersecurity researchers are alerting to a new campaign that leverages web injects to deliver a new Apple macOS malware known as FrigidStealer.The activity has been attributed to a previously undocumented threat actor known as TA2727, with the information stealers for other platforms such as Windows (Lumma Stealer or DeerStealer) and Android (Marcher).TA2727 is a “threat…
-
Android 16 Takes Action Against Scammers with In-Call Security Features
Google is working to enhance the security of its mobile operating system, focusing on preventing scammers from exploiting certain phone features during calls. One key feature of Android 16 aims to block actions like sideloading apps or enabling accessibility access during an active phone call, both of which are commonly used by scammers to gain…
-
Android’s New Security Feature Prevents Sensitive Setting Changes During Calls
Phone scams are becoming more sophisticated with advancements in AI-driven speech tools, making it easier for scammers to manipulate victims. To combat these growing threats, Google has introduced a groundbreaking security feature in Android 16 that prevents users from making certain sensitive settings changes during phone calls, as per a report by Android Authority. This could serve…
-
Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls
Google is working on a new security feature for Android that blocks device owners from changing sensitive settings when a phone call is in progress.Specifically, the in-call anti-scammer protections include preventing users from turning on settings to install apps from unknown sources and granting accessibility access. The development was first reported by Android Authority.Users who…

