Over 500 million UC browser users are exposed to MiTM attacks
UC browser is one of the most famous and widely used browsers over the mobile phone market.
UC Browser and UC browser mini have a combined 600 million play store downloads. UC browser recently downloaded a third party android package kit(APK) which lead to MiTM(Man in The Middle) attacks on UC users. Downloading an APK from a third-party vendor is a direct violation of Google's app store rules. Google does not allow the distributed apps via Google play to modify, replace, or update themselves using any other method than Google Play's update mechanism. The rules also forbid the download of executables from a source other than Google Play.
Researchers have discovered three basic issues that surround UC's activity which include violation of Google play policy, communication over an unsecured channel which may lead to MiTM attacks, and dropping of APK on external storage. Google has already reached out to UC web and asked them to update the apps and remediate the policy violation. UC after using this download started downloading third-party applications on user devices. These applications might target the users and raise a MiTM attack on them.
UC was also using an unsecured communication channel that might provide the attackers with an open door to enter the user system. Using this communication channel attackers can install various malicious payloads and transmit phishing messages to users. UC browser used 9appsdownloading.com for downloading APKs.
Use NPAV and stay protected from all cyber attacks.
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)