Pretend Sign and Telegram apps – Week in safety with Tony Anscombe

Video

ESET analysis uncovers energetic campaigns concentrating on Android customers and spreading espionage code by the Google Play retailer, Samsung Galaxy Retailer and devoted web sites

ESET researchers have uncovered two energetic campaigns concentrating on Android customers and spreading the BadBazaar espionage code by the Google Play retailer, Samsung Galaxy Retailer, and devoted web sites. The malicious code was hidden in apps known as Sign Plus Messenger and FlyGram which are trojanized variations of the official Sign and Telegram apps, respectively. .

What’s the predominant function of the malicious apps, what are their internal workings, and who’s behind these assaults? Discover out within the video and ensure to present the complete report a learn: BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps

Join with us on Facebook, Twitter, LinkedIn and Instagram.


Author:
Date: 2023-08-31 09:10:00

Source link

spot_imgspot_img

Subscribe

Related articles

spot_imgspot_img
Alina A, Toronto
Alina A, Torontohttp://alinaa-cybersecurity.com
Alina A, an UofT graduate & Google Certified Cyber Security analyst, currently based in Toronto, Canada. She is passionate for Research and to write about Cyber-security related issues, trends and concerns in an emerging digital world.

LEAVE A REPLY

Please enter your comment!
Please enter your name here