Android Security
-
A 28-year-old man from Maharashtra fell victim to a stealthy and advanced cyberattack after downloading a seemingly innocent image on WhatsApp. The scam, which didn't involve any suspicious links or OTPs, highlights a disturbing new threat vector that exploits hidden malware embedded in image files.
-
A highly advanced Android spyware operation has surfaced, posing as the official app of the Chinese Prosecutor’s Office. Dubbed SpyMax, this malware is part of the SpyNote family and is capable of hijacking nearly every aspect of an Android device—using deceptive UI tactics and exploiting accessibility services.
-
Cybersecurity experts have uncovered a dangerous malware campaign where hackers mimic the Google Chrome install page to trick Android users into downloading a powerful spying tool called SpyNote. These fake pages look nearly identical to the real Google Play Store and are hosted on newly registered shady domains. When users fall for the trick and install the app, they unknowingly give hackers full control of their device.
-
Cybersecurity researchers have discovered a dangerous new Android spyware app that uses password protection and Android overlay tricks to stay hidden and prevent uninstallation. Installed by someone with physical access, this app secretly spies on the victim while making it very hard to remove.
-
Cybersecurity researchers have discovered a new Android malware, Salvador Stealer, which is designed to steal banking credentials and one-time passwords (OTPs). This malware pretends to be a legitimate banking app, tricking users into entering sensitive financial details.
-
A dangerous Android banking malware named TsarBot is spreading rapidly, targeting over 750 banking, finance, cryptocurrency, and e-commerce apps worldwide. It uses fake login screens, phishing sites, and remote control techniques to steal user credentials and execute fraudulent transactions.
-
Cybersecurity researchers have discovered a dangerous phishing campaign where Pakistani APT hackers are using a fake India Post website to spread malware to Windows and Android users. The fraudulent site, hosted at postindia[.]site, tricks victims into downloading malicious files, putting their data and devices at risk.
-
A new wave of Android malware is exploiting Microsoft’s .NET MAUI framework to evade detection and steal sensitive data. Disguised as banking and social media apps, this malware tricks users into installing fake applications, harvesting their personal information, and sending it to cybercriminals.
-
A dangerous banking trojan named Anatsa (TeaBot) was found hiding in a File Manager and Document Reader app on Google Play. Before it was removed, the app had over 220,000 downloads and targeted users worldwide. This malware steals banking passwords, bypasses two-factor authentication (2FA), and enables hackers to transfer money from victims' accounts.
-
A dangerous new version of the Android Remote Access Tool (RAT), called AndroRAT, is being used by hackers to steal unlock patterns, PINs, and passcodes from Android devices. Originally an open-source university project in 2012, AndroRAT has now evolved into a powerful malware that bypasses security defenses up to Android 15. This latest variant spreads through fake apps and phishing links, using advanced techniques to hijack device controls, steal biometric data, and break into locked smartphones.