APT group trojanizes Telegram app – Week in security with Tony Anscombe

Cyber Security

StrongPity’s backdoor is fitted with various spying features and can record phone calls, collect texts, and gather call logs and contact lists

This week, the ESET research team published their findings about an espionage campaign by the StrongPity APT group that spreads a fully functional, but trojanized version of the legitimate Telegram app for Android. The malicious app – which has various spying features, including recording phone calls and collecting SMS messages – is distributed via a copycat website that mimics Shagle, an adult video-chat service. Never heard about Shagle? Watch the video to learn more not just about the platform, but especially about the StrongPity attacks and its targets and tactics.

For a full technical write-up, head over here: StrongPity espionage campaign targeting Android users.

Products You May Like

Articles You May Like

Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks
OpenSSH Flaws Expose Systems to Critical Attacks
New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now
Salt Typhoon Exploited Cisco Devices With Custom Tool to Spy on US Telcos
Apple Drops iCloud’s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands

Leave a Reply

Your email address will not be published. Required fields are marked *