Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

Malware found in Android apps can steal and monitor all user activity

thedailyposting.comBy thedailyposting.comFebruary 3, 2024No Comments

[ad_1]

Malware named VajraSpy has been found in more than a dozen mobile applications. This is known as a Remote Access Trojan (RAT) and approximately six applications on Google Play are affected. As reported by WeLiveSecurity and ESET, Google immediately removed these apps from the Play Store, but they are still available as third-party apps on the internet. Most of these applications are related to messaging and news. Once these RAT-affected apps are installed, your device will quickly become infected with malware, and the apps can easily steal your personal information, private data, and even record phone calls. You can also automatically turn on the front camera to monitor you. It automatically acquires all permissions on your phone and allows you to monitor and monitor your users, from notifications to messages and images.

ESET researchers were the first to report this virus, and the PatchWork APT group is behind it, targeting people in Pakistan since 2015. In 2022, the group accidentally published its own malware campaign and used Ragnatela RAT to spread viruses. virus. ESET researchers also discovered an application containing his VajraSpy code. These applications included Rafaqat, a news app; Other applications were related to messaging such as Privee Talk, MeetMe, Let’s Chat, Quick Chat, and ChitChat. Apps affected by VajraSpy but available outside of Google Play are Hello Chat, Yahoo Talk, TikTalk, Nidus, GlowChat, and Wave Chat. All of these apps are messaging apps.

The third-party website does not mention the number of people who downloaded the app from it, so we cannot say anything about the number of people affected by that virus. ESET said that most of the victims were from India and Pakistan and were tricked into installing these applications. Google Play is introducing new policies that will make it harder for apps containing malware to exist on the platform. Until then, you shouldn’t download apps recommended by people you don’t know.

VajraSpy malware infiltrates more than a dozen mobile apps, including Google Play, and poses serious privacy threats.

Photo: Digital Information World – AIgen

Read next: Google has removed cached links from search engine results.Cache operators will also be removed soon


[ad_2]
Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.