Detected 3 fake YouTube applications that secretly record and steal user information
Playing an important role in distributing these 3 fake YouTube applications is a cybercriminal group called Transparent Tribe (APT36).
Two of these malicious apps are called YouTube and the third is named Piya Sharma. 3 fake YouTube applications were distributed by Transparent Tribe (APT36) on social networking platforms and fake websites.
After the victim installs, the application will request permission to access the microphone, view and send SMS messages.
Basically, inside the 3 fake YouTube apps is CapraRAT malware, designed to steal personal information, GPS data, record audio, call logs, text messages, capture Screenshots, secret filming and system intervention.
After collecting stolen personal information, crooks will use it to carry out other fraudulent campaigns or resell it to third parties.
SentinelLabs recommends that users only download applications from trusted sources such as the Google Play store and carefully read the permissions requested by the application, to avoid becoming targets of fake applications. In addition, if you feel the application's requirements are unreasonable, stop installing immediately.
This is a malicious application that eavesdrops on users, please check your phone and remove it immediately
Researchers at Lab52 have discovered that Process Manager malware has the ability to record audio and track users' locations.
This application is hidden inside some applications on Google Play. Once installed, it will try to hide on the victim's device with a gear icon, making users mistakenly think that this is part of the system.
According to Lab52, this malicious code was previously linked to Turla, a famous hacker group believed to be supported by the Russian state. This group specializes in using custom malware to target European and American systems, mainly for espionage activities.
On first launch, this malicious application will request access to location, network status, camera, contacts, external memory, call logs, Foreground service, messages, recordings, etc. . to collect device location, send and read text, access memory, take photos/videos with the camera, and record audio.
After being granted the above permissions, this spyware will remove the icon from the screen and run silently in the background, making it very difficult for users to detect.
If you have accidentally installed it, please immediately remove this application by going to Settings -> Apps -> Manage apps, find the malicious application name - > press Uninstall.
You should read it
- How to list all applications on Mac
- 8 apps that help you change yourself and change the world
- Warning of a series of malicious applications that need to be removed from smartphones
- Malicious Web Applications: How to detect and block them
- Apple announced a list of requests to remove applications on the App Store of each country, including Vietnam
- 7 utility applications should install for Windows
- How to detect malicious apps on Android
- Demand for smartphone applications is declining
May be interested
- How to use YouTube Music in Vietnamto use youtube music in vietnam users need to fake ip to other countries.
- Koobface worm exploded in the Christmas seasonsecurity companies have warned about the abuse of the koobface worm to attack social networks, especially facebook, to steal user information on computers.
- Hackers can modify Safari on macOS to steal user dataapple was notified of this security flaw six months ago but has not yet patched it.
- Scammers are using fake Windows updates to steal users' filessome cunning scammers are using fake updates as a front to steal people's data.
- Detect new Android malware fake system update to track and steal user informationthe malware can disguise itself as a system update and is designed to automatically activate whenever new information is entered into a device.
- Google secretly checks fake ads, resulting in many people worryingthe digital advertising industry is looking for and eliminating fake ads, like websites that are considered by reputable brands but are actually just a normal person's site with few views.
- 10 pieces of information used to steal your identitystealing identity can cause incalculable consequences for victims. let's explore 10 kinds of information that thieves use to steal identities through the following article!
- Professional Youtube user guidedo you know how to use youtube professionally? if not, follow these 16 simple youtube tips.
- It turns out this is how hackers attack your computer through the main screenthe video clearly shows how he entered the user's computer through the main screen, creating a vulnerability on the computer to steal personal information. in this way, the hacker can even change the amount of money in the user's bank account.
- Strandhogg vulnerability on Android allows malicious code to impersonate every Android applicationsecurity firm promon recently discovered a new vulnerability, called strandhogg, that exists in android's multi-tasking feature.