Remove 2014 Remove Encryption Remove Information Security Remove Spyware
article thumbnail

XCSSET Mac spyware spreads via Xcode Projects

Security Affairs

The malware also implements ransomware behavior, it is able to encrypt files and display a ransom note. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. Xcode developers are at risk. Pierluigi Paganini.

Spyware 123
article thumbnail

Earth Empusa targets minority group with Android ActionSpy spyware

Security Affairs

The Earth Empusa threat group is distributing new Android spyware, dubbed ActionSpy, through watering hole attacks to targets Turkic minority group. ActionSpy, which may have been around since 2017, is an Android spyware that allows the attacker to collect information from the compromised devices,” reads the report published by Trend Micro.

Spyware 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts found Joker Spyware in 24 apps in the Google Play store

Security Affairs

Security experts at Google have removed from Google Play 24 apps because they were infected with a new spyware tracked as “the Joker.” ” Google has removed from Google Play 24 apps because they were infected with a new spyware tracked as “the Joker.” ” states the analysis. The C&C URL 6.

Spyware 94
article thumbnail

Unknown FinSpy Mac and Linux versions found in Egypt

Security Affairs

Experts from Amnesty International uncovered a surveillance campaign that targeted Egyptian civil society organizations with a new version of FinSpy spyware. The binaries are obfuscated and do some checks to detect if the spyware is running in a Virtual Machine. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

Spyware 139
article thumbnail

Experts spotted a rare Linux Desktop spyware dubbed EvilGnome

Security Affairs

The researchers attribute the spyware to the Russia-linked and Gamaredon Group. The modules used by EvilGnome are reminiscent of the Windows tools used by the Gamaredon Group, other analogies include the use of SFX, persistence with task scheduler and the deployment of information stealers. Pierluigi Paganini.

Spyware 84
article thumbnail

Google removes 17 Joker -infected apps from the Play Store

Security Affairs

The spyware is able to steal SMS messages, contact lists and device information along with to sign victims up for premium service subscriptions. In this case, the stager payload URL encoded in the code itself was encrypted using Advanced Encryption Standard (AES). ” concludes the report. Pierluigi Paganini.

Malware 142
article thumbnail

Google revealed how watering hole attacks compromised iPhone devices earlier this year

Security Affairs

Threat actors used at least five unique iPhone exploit chains that allowed them to remotely jailbreak a device and deliver spyware. The spyware implant was also able to steal the database files from popular end-to-end encryption apps like Whatsapp, Telegram, and iMessage. credentials, authentication tokens, and certificates).

Spyware 88