Faux Sign and Telegram apps – Week in safety with Tony Anscombe


Video

ESET analysis uncovers energetic campaigns focusing on Android customers and spreading espionage code via the Google Play retailer, Samsung Galaxy Retailer and devoted web sites

ESET researchers have uncovered two energetic campaigns focusing on Android customers and spreading the BadBazaar espionage code via the Google Play retailer, Samsung Galaxy Retailer, and devoted web sites. The malicious code was hidden in apps known as Sign Plus Messenger and FlyGram which are trojanized variations of the authentic Sign and Telegram apps, respectively. .

What’s the primary goal of the malicious apps, what are their interior workings, and who’s behind these assaults? Discover out within the video and ensure to provide the total report a learn: BadBazaar espionage device targets Android customers through trojanized Sign and Telegram apps

Join with us on FbTwitterLinkedIn and Instagram.



Leave a Reply

Your email address will not be published. Required fields are marked *

Back To Top