Connect with us

Apps

ESET Research Uncovers APT-C-23 Group’s New Android Spyware

Published

on

ESET researchers have analyzed a new version of Android spyware used by APT-C-23, a threat group active since at least 2017 that is known for mainly targeting the Middle East The new spyware, detected by ESET security products as Android/SpyC23.A, builds upon previously reported versions with extended espionage functionality, new stealth features and updated C&C communication. One of the ways the spyware is distributed is via a fake Android app store, impersonating well-known messaging apps, such as Threema and Telegram, as a lure.

ESET researchers started investigating the malware when a fellow researcher tweeted about an unknown, little-detected Android malware sample in April 2020. “A collaborative analysis showed that this malware was part of the APT-C-23 arsenal – a new, enhanced version of their mobile spyware,” explains Lukáš Štefanko, the ESET researcher who analyzed Android/SpyC23.A.

The spyware was found lurking behind seemingly legitimate apps in a fake Android app store. “When we analyzed the fake store, it contained both malicious and clean items. The malware was hiding in apps posing as AndroidUpdate, Threema and Telegram. In some cases, victims would end up with both the malware and the impersonated app installed,” comments Štefanko.

After installation, the malware requests a series of sensitive permissions, disguised as security and privacy features. “The attackers used social engineering-like techniques to trick victims into granting the malware various sensitive rights. For example, permission to read notifications is masked as a message encrypting feature,” details Štefanko.

Once initialized, the malware can carry out a range of espionage activities based on commands from its C&C server. Besides recording audio; exfiltrating call logs, SMS and contacts; and stealing files, the updated Android/SpyC23.A can also read notifications from messaging apps, make screen and call recordings, and dismiss notifications from some built-in Android security apps. The malware’s C&C communication has also undergone an update, making the C&C server more difficult to identify for security researchers.

The APT-C-23 group is known to have used both Windows and Android components in its operations, with the Android components first described in 2017 by Qihoo 360 Technology under the name Two-tailed Scorpion.Since then, multiple analyses of APT-C-23’s mobile malware have been published. Android/SpyC23.A – the group’s latest spyware version – features several improvements making it even more dangerous to victims.

“To stay safe from spyware, we advise Android users to only install apps from the official Google Play Store, double-check the permissions requested, and use a trustworthy and up-to-date mobile security solution,” concludes Štefanko.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Apps

Experience the ChatGPT ‘Make It More’ Trend: Generate Weird AI Images

Published

on

AI art generators occupy a peculiar space, capable of rendering diverse scenarios, from a cosmic skateboarding dog to a coffee cup adrift in the ocean. Setting aside ethical considerations, some creations may not initially meet expectations, necessitating user prompts to refine the AI-generated output.

Yet, what if the aim isn’t to craft a polished piece of AI art? Enter the “make it more” trend, where ChatGPT users task DALL-E to generate an image and subsequently request the bot to amplify certain aspects. For instance, Justine Moore prompted DALL-E to create a bowl of ramen, then instructed it to make it spicier. The iterative process led to increasingly absurd results, culminating in a bowl of noodles shooting fire beams into outer space.

While the Make It More trend gains traction on ChatGPT and DALL-E, allowing users to experiment with various image transformations, it also raises concerns about resource utilization. The AI processing involved consumes power and energy, prompting considerations about the trend’s efficiency and environmental impact. Nevertheless, these prompts contribute to OpenAI’s ongoing efforts to enhance AI capabilities across platforms like ChatGPT and DALL-E.

Continue Reading

Apps

Samsung Internet is Now Available for Download on Windows PCs

Published

on

Samsung’s default browser, Samsung Internet, has expanded its reach to desktop computers and laptops, now available for download on the Microsoft Store. One notable feature is the ability for users to sync their browsing data between their Galaxy devices and computers.

Upon launching the browser, users can import their browsing history, bookmarks, and search engines from other applications like Google Chrome or Microsoft Edge by signing into their Samsung Cloud account. The browser also supports add-ons and extensions from Chrome and Edge, accessible through the Chrome Web Store.

Samsung Internet for Windows offers familiar features such as incognito mode, light and dark modes, and ad-blocker support. The design elements show similarities to both Chrome and Edge, providing a sense of familiarity for users of those browsers. A useful security feature allows users to delete bookmarks, browsing history, passwords, and other data upon signing out, catering to those who share computers.

Despite its promising features, the browser’s PC debut is marred by a lack of complete sync support. Currently, only browsing history, bookmarks, and search engines can be imported, with no support for transferring saved passwords from Galaxy devices to computers. This omission may be addressed in future updates.

In May, Samsung Internet received an optimisation update for Galaxy tablet users. Toggleable features were introduced, allowing users to control the placement of the browser’s address, bookmark, and tab bars. The update also included a warning for users with a high number of open tabs, informing them that opening another tab would result in the deletion of the oldest tab.

Continue Reading

Apps

Google Clarifies the Cause of Missing Google Drive Files

Published

on

Many Google Drive users recently experienced the unsettling disappearance of their files, prompting concerns. Google has now identified the root cause, attributing the issue specifically to the Google Drive for Desktop app. While assuring that only a limited subset of users is affected, the tech giant is actively investigating the matter and promises timely updates.

To prevent inadvertent file deletion, Google provides the following recommendations:

  1. Avoid clicking “Disconnect account” within Drive for desktop.
  2. Refrain from deleting or moving the app data folder, located at:
    • Windows: %USERPROFILE%\AppData\Local\Google\DriveFS
    • macOS: ~/Library/Application Support/Google/DriveFS
  3. Optionally, create a copy of the app data folder if there is sufficient space on your hard drive.

Before Google officially addressed the issue, distressed users took to the company’s support forum to report deleted files. One user from South Korea highlighted a particularly severe case where their account reverted to May 2023, resulting in the loss of anything uploaded or created after that date. Additionally, the user emphasised that they had not synced or shared their files or drive with anyone else.

As Google delves deeper into resolving this matter, affected users are advised to heed the provided precautions. The company’s commitment to ongoing updates reflects its dedication to swiftly addressing and rectifying the situation. The incident serves as a reminder of the importance of proactive measures to safeguard digital data, especially as users navigate cloud-based platforms such as Google Drive.

Continue Reading
Advertisement
Advertisement

Latest Reviews

Follow us on Facebook