Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

Evolution of MoqHao poses immense threat to Android users

thedailyposting.comBy thedailyposting.comFebruary 20, 2024No Comments

[ad_1]

cyber security threats Experts recently discovered a new variant of the malware named XLoader (commonly known as MoqHao). This variant has the ability to automatically infect devices without user interaction.called Mokuhao’s evolutionthis is a new version of the infamous android malware The organization has long had ties to Roaming Mantis, a group of financially motivated hackers based in China.

In this article, we will explore the background. Mokuhao’s evolution Learn more and see how it behaves differently from previous variants.

Evolution of MoqHao – Timeline


MoqHao is a mobile-based Android threat used for phishing purposes and first appeared on
cyber security threats in 2015. Threat actors behind malware-launched attacks based on phishing activities via SMS (also known as SMS) “Smishing” In Asia. Mokhao’s main targets were Japan, South Korea, and Bangladesh.

However, it later moved to European countries such as France and Germany.This attracted the attention of many people cyber security threats Expert. Since this is notorious, they considered it a serious threat to users. Android malware It scammed thousands of users and stole their money.

recent reports I mentioned this Android malware It currently operates in 27 regional languages. This is a significant increase from his original four regional languages ​​and highlights the broad nature of his target audience.


What has changed in Mokuhao?


The biggest difference from previous versions is
Android malware And the latest thing is that it does not require any user interaction to infect the device. Previous variants required users to manually launch the malware.When the user clicks on the installation link received through her SMS app on the mobile phone, this new cyber security threats connects automatically Malicious code execution.


How does the evolved Mokuhao work?


Understanding how malware works
Developing a cybersecurity strategy. It uses Unicode strings to disguise itself as a legitimate app, such as the Chrome web browser. However, if users are careful enough, they can identify it because the software’s name looks slightly different. for example, “chromium” “ch” will be displayedrahe”.

Once installed, the malware tricks users into granting dangerous permissions to various apps and notifications. MoqHao asks users to make the malicious application their default messaging app. That is, it may work in the background.

Such permissions allow malware to perform malicious actions without raising any red flags. The malware extracts landing URLs and phishing messages through the user’s girlfriend’s Pinterest profile. It also has the ability to run a wide range of commands, including:

  • get_photo: Sends the user’s photo to the server.
  • gcont: Transfers the user’s contact list to the control server.
  • get_photo: A collection of data related to device identifiers, such as SIM numbers.
  • sendSms: Send malicious messages by impersonating them.


conclusion


Data leakage
cyber security threatsIn recent years, public interest has increased.of Mokuhao’s evolution It poses a major phishing threat to the world. Given the severity of the attack and its aftermath; Proactive cybersecurity measures This is essential as it can protect you from such threats and improve your overall security posture.

Sources for this article include the following articles McAfee and peepee computer.

The article MoqHao evolution poses immense threat to Android users appeared first on TuxCare.

*** This is a TuxCare Security Bloggers Network syndicated blog written by Wajahat Raja. Read the original post: https://tuxcare.com/blog/moqhao-evolution-poses-immense-threat-to-android-users/

[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.