Tuesday, October 27, 20:12
Home security SpyNote: New Android Trojan found in secret forums

SpyNote: New Android Trojan found in secret forums

SpyNote: A new and powerful Android Trojan has leaked to several underground forums, making it free for less skilled hackers. Very likely to use it in attacks.

The Trojan app is called SpyNote and allows hackers steal user messages and contacts, listen to their calls, record sound using the device's built-in microphone, control the camera, and much more.

SpyNote

According to researchers from Palo Alto Networks, SpyNote does not require access root on a device, but prompts users to a long list of installation rights. Trojan can also be done automatically Update and install others malicious applications to the device.

But it is not clear how attackers intend to distribute it to the victims, because researchers have not yet observed any attack. However, with SpyNote Builder's release, it is very likely that an attack will soon be detected.

The builder is an application of Windows which can be used to create customized versions of it malware SpyNote APK (application package Android). Attackers can modify parameters such as the application's name, icon, and command server.

Most malicious applications Android is distributed by third party websites and installed on devices from "unknown sources". This feature is disabled by default on Android devices.

Of course, sometimes, malware overcomes its defenses Google and finds a place in Play Store.

Another possibility is to install it manually Trojan application in an unattended device. There have been cases where users have received pre-infected devices as gifts from people who wanted to spy on them.

Newer versions of Android have features anti-malware such as Verify Apps and SafetyNet that can detect and block known malware applications.

As a general rule, installing applications from third-party sources can be very dangerous - these sources often lack the governance provided by official sources, As the Google Play Store, which, even with detailed procedures and algorithms to eliminate malicious applications, is not impregnable.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

LIVE NEWS

00:01:47

Data breach in a law firm exposes data of Google employees

Immigration law firm Fragomen, Del Rey, Bernsen & Loewy, LLP revealed that it suffered a data breach that led to the leakage of personal data ...

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...

Violation in a psychotherapy clinic led to blackmail of patients

Two years ago, a cyber attack took place in a Finnish psychotherapy clinic, which resulted in data theft and ransom demand. Now,...