![]() Each application sends the stolen data over a hundred times. The volume of data transmitted by the spyware distinguishes it from typical cases. Read more on Chinese spyware: CISA: Patch Bug Exploited by Chinese E-commerce App In addition to collecting personal information from users’ devices, such as contact lists and media files (picture, audio and video files), the applications transmit the stolen data to multiple malicious servers predominantly located in China. ![]() “The reports from our behavioral analysis engine show that both spyware collect very personal data from their targets, to send them to a large number of destinations which are mostly located in China and identified as malicious,” explained Roxane Suau, the Pradeo researcher who uncovered the spyware. One of the spyware applications falsely claimed on its Google Play Store profile that it does not collect user data. ![]() ![]() Their main objective is to covertly extract and transmit sensitive user data to malicious servers based in China. The apps, attributed to the same developer and discovered by cybersecurity firm Pradeo, exhibit similar malicious behaviors and operate without user interaction. Two spyware applications posing as file management tools have been discovered on the Google Play Store with a total of at least 1.5 million installs. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |