bitcoin
Bitcoin (BTC) $ 62,701.80 3.10%
ethereum
Ethereum (ETH) $ 2,447.16 1.44%
tether
Tether (USDT) $ 0.999852 0.05%
bnb
BNB (BNB) $ 577.68 2.87%
solana
Solana (SOL) $ 145.86 2.95%
staked-ether
Lido Staked Ether (STETH) $ 2,445.39 1.41%
usd-coin
USDC (USDC) $ 1.00 0.01%
dogecoin
Dogecoin (DOGE) $ 0.110876 2.58%
xrp
XRP (XRP) $ 0.538160 0.60%
shiba-inu
Shiba Inu (SHIB) $ 0.000018 5.86%
cardano
Cardano (ADA) $ 0.353864 3.06%
avalanche-2
Avalanche (AVAX) $ 28.39 8.67%
the-open-network
Toncoin (TON) $ 5.24 1.33%
wrapped-bitcoin
Wrapped Bitcoin (WBTC) $ 62,673.79 3.28%
bitcoin-cash
Bitcoin Cash (BCH) $ 328.15 1.43%
tron
TRON (TRX) $ 0.161228 1.48%
pepe
Pepe (PEPE) $ 0.000010 5.13%
litecoin
Litecoin (LTC) $ 65.64 1.17%
internet-computer
Internet Computer (ICP) $ 8.20 1.52%
fetch-ai
Artificial Superintelligence Alliance (FET) $ 1.44 8.20%

New And Dangerous Android Attack—12 Words Are Targeted By Hackers


Security researchers have uncovered a new and dangerous Android hacking campaign, and this one is also highly inventive. Targeting a 12-word phrase, the SpyAgent malware disguises itself as one of 280 apps so far and uses optical character recognition technology during the devious attacks. Fall victim to a successful compromise, and it could be very costly as these hackers are after your money.

The Android SpyAgent Hack Employs Innovative New Attack Methodology

The McAfee Mobile Research Team recently identified more than 280 applications being used as launchpads for SpyAgent malware, which has been actively targeting Android users since the start of the year. These fake apps, pretending to be everything from banking to streaming utilities, will use distraction techniques such as “endless loading screens, unexpected redirects, or brief blank screens to hide their true activities,” report author SangRyol Ryu, said.

ForbesGoogle Issues Android Attack Warning As 0-Day Threat Strikes

As it turns out, the true activity is to gather together all your SMS text messages, contacts and, importantly as I’ll come to momentarily, every image you have stored on your Android device. All of this data is then sent to a remote server where the clever, dangerous and ultimately potentially costly work begins.

These fake apps are usually the initial payload of a phishing campaign aimed at getting users to an apparently genuine but actually malicious website where they are tricked into making the download. The trickery doesn’t stop there, of course, as what they are downloading is an Android Package Kit file rather than a genuine app. When installed, this requests permissions to access SMS messages, contacts and data storage. Gaining access to your photos is the primary objective as these are then scanned using OCR technology, but don’t worry, the hackers aren’t after your private, nudge nudge, wink wink, images. What they are looking for is a mnemonic key.

ForbesNew Gmail App Access Password Deadline—You Have 4 Weeks To Comply

What’s a mnemonic key, you ask? Simply put, this is a 12-word passphrase, although they can reach 24 words in total. A passphrase for what? Your cryptocurrency wallet, or rather the recovery of your crypto wallet. “This suggests a major emphasis on gaining entry to and possibly depleting the crypto assets of victims,” Ryu said.

Mitigating The SpyAgent Android Threat

We’ve been talking about SpyAgent as an Android threat, which is certainly what it is currently. However, Ryu said that the McAfee researcher have found an item that was labeled as “iPhone” within the admin panel code which suggests that the developers of the malware could be attempting to target iOS users in a future version. “While no direct evidence of an iOS-compatible version has been found yet,” Ryu said, “the possibility of its existence is genuine.”

Regardless, the mitigation is the same as always: stay aware of the phishing threat, only install apps from official app stores, don’t follow links in unsolicited emails or text messages, and don’t grant permissions for any app that appears excessive, unwarranted or intrusive in any way.

Google advises Android users to employ Google Play Protect To check both your apps and device for harmful behavior. While Google Play Protect is enabled by default, Google recommends that users check to ensure it hasn’t been disabled. To do this, open the Google Play app, tap your profile icon, tap settings, then ensure scan apps with Play Protect is toggled on.



Read More: New And Dangerous Android Attack—12 Words Are Targeted By Hackers

Disclaimer:The information provided on this website does not constitute investment advice, financial advice, trading advice, or any other sort of advice and you should not treat any of the website’s content as such. coinzoop.com does not recommend that any cryptocurrency should be bought, sold, or held by you. Do conduct your own due diligence and consult your financial advisor before making any investment decisions.

Leave A Reply

Your email address will not be published.