Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

MoqHao Android malware evolves with autorun capabilities

thedailyposting.comBy thedailyposting.comFebruary 9, 2024No Comments

[ad_1]

February 9, 2024news roomMobile security/cyber threats

MoqHao Android Malware

Threat hunters have identified a new variant of Android malware. Mokhao It runs automatically on infected devices without requiring any user interaction.

“While MoqHao typically requires users to install and launch an app to accomplish its desired goal, this new variant does not require that users do so,” McAfee Research said in a report released this week. Stated. “Malicious activity begins automatically while the app is installed.”

Targets for this campaign include Android users in France, Germany, India, Japan, and South Korea.

MoqHao, also known as Wroba and XLoader (not to be confused with the Windows and macOS malware of the same name), is an Android-based mobile threat associated with a Chinese financial cluster called Roaming Mantis (also known as Shaoye).

cyber security

A typical attack chain begins with an SMS message containing a malicious link themed around package delivery, which when clicked from an Android device leads to malware deployment, but when accessed from an iPhone, victims are directed to Apple’s iCloud login page You will be redirected to a credential collection page disguised as .

In July 2022, Sekoia detailed a campaign that compromised at least 70,000 Android devices in France. As of early last year, an updated version of MoqHao was found to be able to infiltrate Wi-Fi routers and perform Domain Name System (DNS) hijacking, highlighting attackers’ efforts to innovate their arsenal. Ta.

The latest version of MoqHao continues to be distributed via smishing techniques, but what has changed is that the malicious payload is automatically executed upon installation, giving victims dangerous permissions without launching the app. It is an invitation to give. This behavior is caused by the HiddenAds malware.

Another improvement is that links shared in the SMS message itself are hidden using a URL shortener to increase the chances of a successful attack. The content of these messages is extracted from the bio (or description) field of fraudulent Pinterest profiles set up for this purpose.

MoqHao Android Malware

MoqHao has several features that can secretly collect sensitive information such as device metadata, contacts, SMS messages, photos, call specific numbers in silent mode, and enable/disable Wi-Fi. It is equipped with the following functions.

McAfee said it reported its findings to Google, which is “already working on introducing mitigations to prevent this type of automatic execution in future Android versions.”

The development comes as Chinese cybersecurity firm QiAnXin has announced that a previously unknown cybercriminal organization named Bigpanzi is targeting Android-based smart TVs and set-tops in order to corral them into a botnet that performs decentralized denial. Box (STB) was revealed to be involved in a breach. Service (DDoS) attack.

cyber security

The operation has been running since at least 2015 and is estimated to control a botnet consisting of 170,000 daily active bots, most of which are located in Brazil. However, since August 2023, 1.3 million different Brazilian IP addresses have been associated with his Bigpanzi.

This infection is possible by tricking users into installing booby-trapped apps that stream pirated movies and TV shows through creepy websites. The campaign was first revealed by Russian antivirus vendor Doctor Web in September 2023.

“Once installed, these devices turn into operational nodes within illegal streaming media platforms, supporting services such as traffic proxies, DDoS attacks, serving OTT content, and pirated traffic,” QiAnXin researchers said. I am.

“The possibility that Big Punji-controlled televisions and STBs could broadcast violent, terrorist, or pornographic content, or use increasingly persuasive AI-generated videos for political propaganda, poses a serious threat to social order and stability. poses a threat.”

Did you find this article interesting? Follow us twitter ○ You can read more exclusive content from us on LinkedIn.



[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.