Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

‘eXotic Visit’ spyware campaign targets Android users in India and Pakistan

thedailyposting.comBy thedailyposting.comApril 10, 2024No Comments

[ad_1]

April 10, 2024news roomMobile security/spyware

exotic visiting malware

An active Android malware campaign called “eXotic Visit” primarily targets users in South Asia, particularly India and Pakistan, and distributes the malware through dedicated websites and the Google Play Store.

The Slovak cybersecurity company said the activity has been ongoing since November 2021 but is not linked to any known attackers or groups. We are tracking the group behind the operation by the name. virtual invaders.

“The downloaded app provides legitimate functionality, but also contains code from the open source Android XploitSPY RAT,” ESET security researcher Lukáš Štefanko said in a technical report published today.

The campaign is said to be targeted in nature, with only a small number of installs for the apps available on Google Play, ranging from 0 to 45, after which the apps were removed.

cyber security

The fake but functional apps mainly pretend to be messaging services such as Alpha Chat, ChitChat, Defcom, Dink Messenger, Signal Lite, TalkU, WeTalk, Wicker Messenger, and Zaangi Chat. Around 380 victims are said to have downloaded the app and created accounts to use for messaging purposes.

Also part of eXotic Visit are apps like Sim Info and Telco DB, both of which claim to provide detailed information about SIM owners by simply entering their Pakistan-based phone number. Other applications pretend to be food ordering services at legitimate hospitals in Pakistan and India called Specialist Hospitals (now rebranded as Trilife Hospitals).

exotic visiting malware

exploit spy, uploaded It was posted on GitHub in April 2020 by a user named RaoMK and was associated with an Indian cybersecurity solutions company called XploitWizer. It is also described as a fork of another open source Android Trojan called L3MON, which he says was inspired by AhMyth.

It has a wide range of features that allow it to collect sensitive data such as GPS location, microphone recordings, contacts, SMS messages, call logs, and clipboard contents from infected devices. Extract notification details from apps like WhatsApp, Facebook, Instagram, Gmail, etc. Download and upload files. Show installed apps. and queue the command.

Additionally, the malicious app is designed to take photos, screenshots, enumerate files in several directories related to WhatApp, WhatsApp Business, Telegram, and an unofficial WhatsApp MOD known as GBWhatsApp .

cyber security

“Over the years, these threat actors have customized their malicious code by adding obfuscation, emulator detection, and concealment capabilities. [command-and-control] addresses, use of native libraries, etc.,” Stefanko said.

The primary purpose of the native library (‘defcome-lib.so’) is to encode and hide C2 server information from static analysis tools. If the emulator is detected, the app utilizes a fake C2 server to evade detection.

Some apps are disseminated through a website created specifically for this purpose (“chitchat.ngrok”).[.]io”) provides a link to an Android package file (“ChitChat.apk”) hosted on GitHub. It is currently unclear how victims are directed to these apps. there is no.

“Distribution started on a dedicated website and then moved to the official Google Play Store,” Stefanko concluded. “The purpose of this campaign is espionage, likely targeting victims in Pakistan and India.”

Did you find this article interesting? Follow us twitter ○ You can read more exclusive content from us on LinkedIn.



[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.