Detected 3 fake YouTube applications that secretly record and steal user information
Playing an important role in distributing these 3 fake YouTube applications is a cybercriminal group called Transparent Tribe (APT36).
Two of these malicious apps are called YouTube and the third is named Piya Sharma. 3 fake YouTube applications were distributed by Transparent Tribe (APT36) on social networking platforms and fake websites.
After the victim installs, the application will request permission to access the microphone, view and send SMS messages.
Basically, inside the 3 fake YouTube apps is CapraRAT malware, designed to steal personal information, GPS data, record audio, call logs, text messages, capture Screenshots, secret filming and system intervention.
After collecting stolen personal information, crooks will use it to carry out other fraudulent campaigns or resell it to third parties.
SentinelLabs recommends that users only download applications from trusted sources such as the Google Play store and carefully read the permissions requested by the application, to avoid becoming targets of fake applications. In addition, if you feel the application's requirements are unreasonable, stop installing immediately.
This is a malicious application that eavesdrops on users, please check your phone and remove it immediately
Researchers at Lab52 have discovered that Process Manager malware has the ability to record audio and track users' locations.
This application is hidden inside some applications on Google Play. Once installed, it will try to hide on the victim's device with a gear icon, making users mistakenly think that this is part of the system.
According to Lab52, this malicious code was previously linked to Turla, a famous hacker group believed to be supported by the Russian state. This group specializes in using custom malware to target European and American systems, mainly for espionage activities.
On first launch, this malicious application will request access to location, network status, camera, contacts, external memory, call logs, Foreground service, messages, recordings, etc. . to collect device location, send and read text, access memory, take photos/videos with the camera, and record audio.
After being granted the above permissions, this spyware will remove the icon from the screen and run silently in the background, making it very difficult for users to detect.
If you have accidentally installed it, please immediately remove this application by going to Settings -> Apps -> Manage apps, find the malicious application name - > press Uninstall.
You should read it
- 16 applications that help students learn more effectively
- The list of applications containing malicious code or malicious ads should be removed from the phone
- How to list all applications on Mac
- 8 apps that help you change yourself and change the world
- Warning of a series of malicious applications that need to be removed from smartphones
- Malicious Web Applications: How to detect and block them
- Apple announced a list of requests to remove applications on the App Store of each country, including Vietnam
- 7 utility applications should install for Windows
- How to detect malicious apps on Android
- Demand for smartphone applications is declining
- 5 types of mobile applications should not be installed on smartphones
- Detecting malicious viruses in the application has more than 100 million downloads
Maybe you are interested
4 Security Steps to Follow When Using Remote Access Applications
15 safe software and application download websites for Windows
Air conditioner control application by iPhone
How to use ProNotes: Extension enhances the Notes application on Mac
6 accurate weather forecast applications on your phone
How to install passkey for application X (Twitter)