Tag: android
-
New Android Identity Check locks settings outside trusted locations
Google has announced a new Android “Identity Check” security feature that lock sensitive settings behind biometric authentication when outside a trusted location. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-android-identity-check-locks-settings-outside-trusted-locations/
-
DONOT Group Deploys Malicious Android Apps in India
The advanced persistent threat (APT) group is likely India-based and targeting individuals with connections to the country’s intelligence community. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/donot-group-malicious-android-apps-india
-
Novel Android malware leveraged by DoNot Team
First seen on scworld.com Jump to article: www.scworld.com/brief/novel-android-malware-leveraged-by-donot-team
-
Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware
A recent phishing campaign has targeted customers of SBI Bank through a deceptive message circulating in WhatsApp groups. The message falsely claims that the recipient’s SBI reward points, amounting to Rs 9,980, will expire unless they download a purported >>SBI BANK REWARD App.
-
Esperts found new DoNot Team APT group’s Android malware
Researchers linked the threat actor DoNot Team to a new Android malware that was employed in highly targeted cyber attacks. CYFIRMA researchers linked a recently discovered Android malware to the Indian APT group known as DoNot Team. The Donot Team (aka APT-C-35 and Origami Elephant) has been active since 2016, it focuses on government and military organizations,…
-
DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection
The Threat actor known as DoNot Team has been linked to a new Android malware as part of highly targeted cyber attacks.The artifacts in question, named Tanzeem (meaning “organization” in Urdu) and Tanzeem Update, were spotted in October and December 2024 by cybersecurity company Cyfirma. The apps in question have been found to incorporate identical…
-
Indian APT Group DONOT Misuses App for Intelligence Gathering
Android apps, linked to APT group DONOT, disguised as a chat platform for intelligence gathering First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/indian-apt-group-donot-app/
-
Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices
Cybersecurity researchers have detailed a now-patched security flaw impacting Monkey’s Audio (APE) decoder on Samsung smartphones that could lead to code execution.The high-severity vulnerability, tracked as CVE-2024-49415 (CVSS score: 8.1), affects Samsung devices running Android versions 12, 13, and 14.”Out-of-bounds write in libsaped.so prior to SMR Dec-2024 Release 1 allows remote First seen on thehackernews.com…
-
First Android Update of 2025 Patches Critical Code Execution Vulnerabilities
This year’s first batch of monthly security updates for Android resolves 36 vulnerabilities, including critical remote code execution flaws. The post First Android Update of 2025 Patches Critical Code Execution Vulnerabilities appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/first-android-update-of-2025-patches-critical-code-execution-vulnerabilities/
-
Antivirus-Apps auf Android: Warum ihr keine braucht und stattdessen diese Tipps beherzigen solltet
First seen on t3n.de Jump to article: t3n.de/news/antivirus-apps-auf-android-warum-ihr-keine-braucht-und-stattdessen-diese-tipps-beherzigen-solltet-1666346/
-
Android patches several vulnerabilities in first security update of 2025
The bulletin identifies five critical remote code execution (RCE) vulnerabilities affecting the core components of Android’s system. First seen on cyberscoop.com Jump to article: cyberscoop.com/android-security-update-january-2025/
-
New FireScam Android Malware Abusing Firebase Services To Evade Detection
FireScam is multi-stage malware disguised as a fake “Telegram Premium” app that steals data and maintains persistence on compromised devices and leverages phishing websites to distribute its payload and infiltrate Android devices. It is Android malware disguised as a fake Telegram Premium app distributed via a phishing website mimicking RuStore, which steals user data like…
-
Firescam: Infostealer tarnt sich als Telegram-Premium-App
Auf Phishing-Seiten sollen Android-Nutzer zur Installation einer gefälschten Telegram-Premium-App bewegt werden. Darin lauert ein Infostealer. First seen on heise.de Jump to article: www.heise.de/news/Firescam-Infostealer-tarnt-sich-als-Telegram-Premium-App-10229710.html
-
Patchday: Wichtige Sicherheitsupdates schützen Android-Geräte
Google und weitere Hersteller von Android-Geräte haben mehrere kritische Lücken in verschiedenen Android-Versionen geschlossen. First seen on heise.de Jump to article: www.heise.de/news/Patchday-Schadcode-Luecken-bedrohen-Android-12-13-14-und-15-10229347.html
-
Patchday: Schadcode-Lücken bedrohen Android 12, 13, 14 und 15
Google und weitere Hersteller von Android-Geräte haben mehrere kritische Lücken in verschiedenen Android-Versionen geschlossen. First seen on heise.de Jump to article: www.heise.de/news/Patchday-Schadcode-Luecken-bedrohen-Android-12-13-14-und-15-10229347.html
-
Android Security Updates: Patch for Critical RCE Vulnerabilities
The January 2025 Android Security Bulletin has issued important updates regarding critical vulnerabilities that affect Android devices. Users are urged to ensure their devices are updated to the latest security patch level, which as per the bulletin, should be 2025-01-05 or later to mitigate potential risks. Overview of Vulnerabilities The bulletin highlights a series of…
-
FireScam Android Spyware Campaign Poses ‘Significant Threat Worldwide’
A fake Telegram Premium app delivers information-stealing malware, in a prime example of the rising threat of adversaries leveraging everyday applications, researchers say. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/firescam-android-spyware-campaign-significant-threat-worldwide
-
MSSP Market News: FireScam Malware Targets Android Devices
First seen on scworld.com Jump to article: www.scworld.com/news/mssp-market-news-firescam-malware-targets-android-devices
-
FireScam infostealer poses as Telegram Premium app to surveil Android devices
Once installed, it helps itself to your data like it’s a free buffet First seen on theregister.com Jump to article: www.theregister.com/2025/01/06/firescam_android_malware/
-
FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices
An Android information stealing malware named FireScam has been found masquerading as a premium version of the Telegram messaging app to steal data and maintain persistent remote control over compromised devices.”Disguised as a fake ‘Telegram Premium’ app, it is distributed through a GitHub.io-hosted phishing site that impersonates RuStore a popular app store in the Russian…
-
Stealthy Steganography Backdoor Attacks Target Android Apps
BARWM, a novel backdoor attack approach for real-world deep learning (DL) models deployed on mobile devices. Existing backdoor attacks often suffer from limitations such as altering the model structure or relying on easily detectable, sample-agnostic triggers. By utilizing DNN-based steganography to generate sample-specific backdoor triggers that are imperceptible, it is able to circumvent these limitations.…
-
Proton VPN v6.3.46.0 Crack für Android App erschienen
Nach längerer Pause ist nun wieder eine illegale Version der Android-App von Proton VPN aufgetaucht. Sollte man die App besser meiden? First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/szene/warez/proton-vpn-v6-3-46-0-crack-fuer-android-app-erschienen-306969.html
-
New FireScam Android data-theft malware poses as Telegram Premium app
A new Android malware named ‘FireScam’ is being distributed as a premium version of the Telegram app via phishing websites on GitHub that mimick the RuStore, Russia’s app market for mobile devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-firescam-android-data-theft-malware-poses-as-telegram-premium-app/
-
FireScam malware poses as Telegram app to steal sensitive Android data
First seen on scworld.com Jump to article: www.scworld.com/news/firescam-android-malware-poses-as-telegram-app-to-steal-sensitive-data
-
New FireScam Infostealer Spyware Hits Android via Fake Telegram Premium
Researchers at Cyfirma have discovered FireScam, an Android malware disguised as ‘Telegram Premium’ that steals data, monitors activity, and infiltrates devices. Learn about its distribution, functionality, and the impact on user privacy. First seen on hackread.com Jump to article: hackread.com/firescam-infostealer-spyware-android-fake-telegram-premium/
-
Privacy Roundup: Week 1 of Year 2025
Tags: access, ai, android, apple, authentication, botnet, breach, browser, business, captcha, chrome, compliance, cve, cybersecurity, data, data-breach, detection, email, encryption, exploit, finance, firmware, flaw, google, group, hacker, healthcare, HIPAA, infrastructure, injection, Internet, law, leak, login, malware, open-source, password, phishing, privacy, router, service, software, threat, tool, update, virus, vulnerabilityThis is a news item roundup of privacy or privacy-related news items for 29 DEC 2024 – 4 JAN 2024. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional “security” content mixed-in here due to the close relationship between online privacy and cybersecurity – many things overlap; for…
-
FireScam: Malware für Android kommt als Telegram Premium App
Telegram Premium als Tarnung: FireScam ist eine Malware, die mit Hilfe von Phishing-Seiten und Firebase gezielt Android-Geräte angreift. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/it-sicherheit/malware/firescam-malware-fuer-android-kommt-als-telegram-premium-app-306874.html
-
FireScam Android info-stealing malware supports spyware capabilities
FireScam malware steals credentials and financial data by monitoring Android app notifications and sending data to a Firebase database. Cybersecurity firm Cyfirma warns of the FireScam Android info-stealing malware that supports spyware capabilities. The malicious code steals credentials and financial data by monitoring app notifications and sending the information to a Firebase database. The malware…
-
FireScam Android Malware Packs Infostealer, Spyware Capabilities
The FireScam Android infostealer monitors app notifications and harvests credentials and financial data and sends it to a Firebase database. The post FireScam Android Malware Packs Infostealer, Spyware Capabilities appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/firescam-android-malware-packs-infostealer-spyware-capabilities/

