Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

12 dangerous Android apps that try to steal your WhatsApp texts

thedailyposting.comBy thedailyposting.comFebruary 4, 2024No Comments

[ad_1]

If you’re using Android, you’ll need to check the list of apps installed on your device. It studied more than a dozen Android apps with malicious code that could extract private messages from WhatsApp, record calls, copy contact numbers, and secretly take photos. This is because people are sounding the alarm.

This terrifying malware is known as VajraSpy and was discovered by a team from cybersecurity company ESET. The Patchwork APT group is believed to be behind the latest malware campaign. The group has been active since the end of 2015 and has deployed numerous malware during that time.


Half of the apps identified by the researchers were available on the Google Play Store, while the remaining six were only accessible through third-party app stores. Most of these were disguised as messaging or news apps, researchers claim.

Split image shows an example WhatsApp conversation on one side and lines of VajraSpy spyware code on the other

ESET researchers have shared evidence of VajraSpy malware that tracks messages sent within WhatsApp

ESET

Google removed the app from its digital store shelves as soon as it was reported by ESET’s team. However, this only prevents new users from installing malicious software…if you’ve downloaded these apps before, they’ll still be lurking on your handset.

Patchwork APT primarily targeted users in South Asia. According to Google Play Store statistics, some of these apps have been downloaded more than 1,000 times. However, the true number of people affected by this campaign will never be known, as third-party stores do not report download numbers.

ESET warns Android users that they should always avoid downloading unknown chat apps that are recommended by strangers or have few reviews in their store listings. This category has been a common and long-standing target for cybercriminals. looking for Infiltrate your device.

Messaging apps are extremely popular and require many permissions to work properly, including access to your camera, location data, files, and more. This level of access is very attractive to criminals looking to steal data.

This is not the first time that an app infected with VajraSpy spyware has entered the Google Play Store. Last year, Google had to: Eliminate a malware app with 2 million downloads.

Here are the latest apps reported by ESET researchers:

  • Rafaqat رفاقت — Found on Google Play Store
  • Privee Talk — Found on Google Play Store
  • MeetMe — Found in Google Play Store
  • Let’s Chat — Found on Google Play Store
  • Quick Chat — Found in Google Play Store
  • Chit Chat — Found on Google Play Store
  • Hello Chat — Found in third-party app stores
  • YohooTalk — Found in third-party app stores
  • TikTalk — Found in third-party app stores
  • Nidus — Found in third-party app stores
  • GlowChat — Found in third-party app stores
  • Wave Chat — Found in third-party app stores

In response to the latest report from the researchers, a Google spokesperson told security blog Bleeping Computer:

“Users are protected by Google Play Protect. Google Play Protect protects apps that are known to exhibit this malicious behavior on Android devices with Google Play Services. You can be alerted even if it comes from a source other than Play.

[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.