Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

12 Android apps caught spying on smartphone users in India and Pakistan: The names are as follows:

thedailyposting.comBy thedailyposting.comFebruary 13, 2024No Comments

[ad_1]

Earlier this month, ESET security researchers identified 12 Android spy apps that share the same malicious code. All reported apps claim to be messaging tools, except for one that pretends to be a news app. In the background, these apps secretly run remote access Trojan (RAT) code called VajraSpy, which is used by the Patchwork APT group for targeted espionage.

VajraSpy is said to have a variety of spying features that can be extended based on the permissions granted to apps bundled with the code. Steal contacts, files, call logs, and SMS messages. Some of these apps can also extract WhatsApp and Signal messages, record calls, and even take photos with the camera.

ESET’s telemetry data registered only detections from Malaysia, but the company said they were merely incidental and did not constitute the campaign’s actual targets, which were Android smartphone users in India and Pakistan. That’s what I think. “Victims believed they were approached through a honeytrap romance scam in which campaigners expressed romantic or sexual interest in targets on another platform and persuaded them to download a Trojanized app. “There are,” the report states.

Please also read | Explained: What is a voice clone scam and how to avoid falling victim to it?

Twelve of these apps were in the Google Play Store, while others (including Xamalicious) were in third-party app stores. Google has removed all apps, but if anyone has downloaded any of these apps on their phone, they will need to remove them manually.

The apps available on Google Play are:
* hello chat

*Chat

Expanding


* Meet Me

*Nidas

*Rafa Cut News

*Tick talk

* Wave chat

*Private talk

*Glow Glow

*Let’s chat

* Nionioni

* Quick chat

* Yahoo Talk

Apps using Xamalicious* Essential horoscope for Android

* 3D skin editor for PE Minecraft

* Logo Maker Pro

* Auto click repeater

*Count easy calorie calculator

* Volume extender

*Letter link

* Numerology: Personal horoscope and number predictions

* Step Keeper: Easy pedometer

* Track your sleep

* Volume booster

* Astrology Navigator: Daily Horoscope and Tarot

* Universal calculator


[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.