Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

New Android threat sends photos, texts, contacts, hardware data, and more to external servers

thedailyposting.comBy thedailyposting.comFebruary 24, 2024No Comments

[ad_1]

According to Bleeping Computer, a new version of the XLoader malware (also known as MoqHao) is in circulation. Previously, this malware was found in the US, UK, Germany, France, Japan, South Korea, and Taiwan. The malware is spread through SMS text messages that feature shortened URL links, allowing XLoader to launch immediately after installation. This can allow the malware to run undetected in the background while your personal data is stolen.
Fake permission requests appear to come from Google Chrome - new Android threat sends photos, texts, contacts, hardware data, and more to external serversFake permission requests appear to come from Google Chrome - new Android threat sends photos, texts, contacts, hardware data, and more to external servers

Fake permission requests appear to come from Google Chrome

“Malicious activity is automatically initiated while the app is installed,” McAfee said. “We are working to implement mitigation measures to prevent this.”

Another fake permission request - new Android threat sends photos, texts, contacts, hardware data, etc. to external serversAnother fake permission request - new Android threat sends photos, texts, contacts, hardware data, etc. to external servers

Another fake permit application

The malicious app sends permission requests disguised as coming from Google Chrome, asking for permission to send and view SMS (text) messages, and asking for permission to keep Chrome running in the background. And the biggest advantage is the permission to make “Chrome” the default SMS app. With all these permissions, the malware is used to send photos, text messages, contact list, and information about the hardware you are using (including your phone’s unique IMEI number) to a controlling server. . Yes, it’s very scary.

McAfee says the new XLoader malware is even more dangerous than its predecessors because it requires minimal interaction from victims. I have good news. According to an update from McAfee a few weeks ago, Android devices with Google Play Services are protected from this type of malware attack by Google Play Protect, which is enabled by default.

However, there are some things to consider here. Never click on shortened URLs in messages. Also, don’t sideload apps.

[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.