article thumbnail

Experts discovered surveillance tool EagleMsgSpy used by Chinese law enforcement

Security Affairs

Chinese law enforcement uses the mobile surveillance tool EagleMsgSpy to gather data from Android devices, as detailed by Lookout. Researchers at the Lookout Threat Lab discovered a surveillance tool, dubbed EagleMsgSpy, used by Chinese law enforcement to spy on mobile devices. The IP address 202.107.80[.]34

article thumbnail

New Mobile Phone Forensics Tool

Schneier on Security

Meiya Pico maintains partnerships with domestic and international law enforcement partners, both as a surveillance hardware and software provider, as well as through training programs for law enforcement personnel. Massistant gains access to device GPS location data, SMS messages, images, audio, contacts and phone services.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

T-Mobile detected network intrusion attempts and blocked them

Security Affairs

T-Mobile reported recent infiltration attempts but pointed out that threat actors had no access to its systems and no sensitive data was compromised. T-Mobile detected recent infiltration attempts but confirmed no unauthorized system access occurred, and no sensitive data was compromised. This is not the case at T-Mobile.”

article thumbnail

Report claims that Serbian authorities abused Cellebrite tool to install NoviSpy spyware

Security Affairs

Researchers warn of previously undetected surveillance spyware, named NoviSpy, that was found infecting a Serbian journalist’s phone. Then he requested help from Amnesty Internationals Security Lab fearing to be the target of surveillance software like other journalists in Serbia. Development traces back to at least 2018.

article thumbnail

U.S. Court rules against NSO Group in WhatsApp spyware Lawsuit

Security Affairs

Court documents state that on October 29, 2019, plaintiffs filed this lawsuit, alleging that the defendants used WhatsApp to target approximately 1,400 mobile phones and devices to infect them with the surveillance software. ” reads the court document. ” The U.S. from April 29, 2018, to May 10, 2020).

article thumbnail

Happy 15th Anniversary, KrebsOnSecurity!

Krebs on Security

Much of my summer was spent reporting a story about how advertising and marketing firms have created a global free-for-all where anyone can track the daily movements and associations of hundreds of millions of mobile devices , thanks to the ubiquity of mobile location data that is broadly and cheaply available.

article thumbnail

Experts warn of the new sophisticate Crocodilus mobile banking Trojan

Security Affairs

Camera Access: Starts front camera streaming for potential identity theft or surveillance. “The emergence of the Crocodilus mobile banking Trojan marks a significant escalation in the sophistication and threat level posed by modern malware. Data Theft: Captures Google Authenticator screen content to steal OTP codes.