article thumbnail

China-Linked Apps Pose Threat to Google Play Store Users

SecureWorld News

The Google Play Store, a widely-trusted source for Android applications, has recently become a battleground for a concerning wave of spyware with ties to China. Operating under the radar, these apps silently collect and transmit sensitive data to servers based in China, posing significant risks to user data security and privacy.

Spyware 63
article thumbnail

Security Affairs newsletter Round 223 – News of the week

Security Affairs

Media File Jacking allows manipulating media files users receive via Android WhatsApp and Telegram. Mysterious hackers steal data of over 70% of Bulgarians. Experts spotted a rare Linux Desktop spyware dubbed EvilGnome. Israel surveillance firm NSO group can mine data from major social media.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On the 20th Safer Internet Day, what was security like back in 2004?

Malwarebytes

Data collected by the Internet Storm Center dug into “Survival Time History”, which is “calculated as the average time between reports for an average target IP address. The pop up blocker in particular was a big help with the proliferation of adware and spyware plugging into advertising networks.

article thumbnail

Advanced threat predictions for 2024

SecureList

This politician became the target of a previously undiscovered “zero-day” attack aimed at infecting his phone with spyware. BlackEnergy APT attacks in Ukraine are a prominent example from the last decade, known for destructive actions against media companies, compromising industrial control systems and engaging in cyber-espionage.

Hacking 109
article thumbnail

In conversation: Bruce Schneier on AI-powered mass spying

Malwarebytes

I have access to AI tools in a way that I don’t have access to data collection regimes. There’s an entire industry of super creepy spyware that is sold to people who want to spy on their wives and girlfriends. The tech monopolies are so powerful, and we saw that with social media. What about people?

article thumbnail

The State of Stalkerware in 2023–2024

SecureList

Not only can the intruder violate their victim’s privacy by monitoring their activities, but they can also use the software to access huge volumes of personal data. Depending on the software they use, they can monitor anything from device location to text messages, social media chats, photos, browser history and more.

Mobile 84
article thumbnail

FinSpy: unseen findings

SecureList

Kaspersky has been tracking deployments of this spyware since 2011. TeamViewer, VLC Media Player, WinRAR) as well as portable applications. Based on the data collected by the Post-Validator, it is most likely that: The Post-Validator is deployed to ensure that the infected victim is the intended one. WiFiRecorder (0x28).