Her researchers Bitdefender have detected a new powerful Android Spyware called Triout. It can record secret phone calls, collect images, videos, sms and GPS coordinates of the victims and send this information to the intruders.
The Triout has been active since May this year and is being circulated through a fake application Android which was available in the 2016 Google Play Store.
Although the app has been removed from the Play Store, a remanufactured version is still available from other sources and is signed by the original Google Debug Certificate.
Spyware is designed to turn Android devices into a powerful tracking tool and sends stolen data to attacked servers.
Researchers are unsure about the origin of the app or how many times they have been installed on phones, but are probably released through third-party app stores or application sharing forums.
The analysis of the malicious program indicates that it came from Russia, but it was not necessarily created there. Many Israeli samples collected from the application were also identified, implying a massive monitoring and espionage campaign.
The most impressive, however, is that Spyware is totally unclear, which means that only opening the file . Apk will make the source code visible. This suggests that software can be a work in progress and perhaps its creators may experience additional features to be compatible with more devices.
To avoid becoming victims of Triout or similar malware, researchers are encouraging users not to install applications other than those from the official store. They also advise users not to give unnecessary licenses that give access to call logs, messages, and media files.