Fake Signal and Telegram apps – Week in security with Tony Anscombe

Cyber Security

Video

ESET research uncovers active campaigns targeting Android users and spreading espionage code through the Google Play store, Samsung Galaxy Store and dedicated websites

ESET researchers have uncovered two active campaigns targeting Android users and spreading the BadBazaar espionage code through the Google Play store, Samsung Galaxy Store, and dedicated websites. The malicious code was hidden in apps called Signal Plus Messenger and FlyGram that are trojanized versions of the legitimate Signal and Telegram apps, respectively. .

What is the main purpose of the malicious apps, what are their inner workings, and who is behind these attacks? Find out in the video and make sure to give the full report a read: BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps

Connect with us on FacebookTwitterLinkedIn and Instagram.

Products You May Like

Articles You May Like

FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
RSAC: How CISOs Should Protect Themselves Against Indictments
In it to win it! WeLiveSecurity shortlisted for European Security Blogger Awards
New ‘LLMjacking’ Attack Exploits Stolen Cloud Credentials
Black Basta Ransomware Victim Count Tops 500

Leave a Reply

Your email address will not be published. Required fields are marked *