25 Million Android Phones Infected With Malware That ‘Hides In WhatsApp’

thismybgolname

Rising Star
OG Investor
As many as 25 million Android phones have been hit with malware that replaces installed apps like WhatsApp with evil versions that serve up advertisements, cybersecurity researchers warned Wednesday.

Dubbed Agent Smith, the malware abuses previously known weaknesses in the Android operating system, making updating to the latest, patched version of Google’s operating system a priority, Israeli security company Check Point said.

Most victims are in India, where as many as 15 million were infected. But there are more than 300,000 in the U.S., with another 137,000 in the U.K., making this one of the more severe threats to have hit Google’s operating system recently.


The malware has spread via a third-party app store, 9apps.com, which is owned by China’s Alibaba, rather than the official Google Play store. Typically, such non-Google Play attacks focus on developing countries, making the hackers’ success in the U.S. and the U.K. more remarkable, Check Point said.

While the replaced apps will serve up malicious ads, whoever’s behind the hacks could do worse, Check Point warned in a blog. “Due to its ability to hide its icon from the launcher and impersonates any popular existing apps on a device, there are endless possibilities for this sort of malware to harm a user’s device,” the researchers wrote.


They said they’d warned Google and the relevant law enforcement agencies. Google hadn’t provided comment at the time of publication.

Typically the attack works as follows: Users download an app from the store—typically a photo utility, games or adult-themed apps (one called Kiss Game: Touch Her Heart is advertised with a cartoon of a man kissing a scantily clad woman). This app then silently installs the malware, disguised as a legitimate Google updating tool. No icon appears for this on the screen, making it even more surreptitious. Legitimate apps—from WhatsApp to the Opera browser and more—are then replaced with an evil update so they serve the bad ads. The researchers said the ads themselves weren’t malicious per se. But in a typical ad fraud scheme, every click on an injected advertisement will send money back to the hackers, as per a typical pay-per-click system.

There’s some indication that the attackers are considering moving to Google Play. The Check Point researchers said they’d found 11 apps on Google’s store that contained a “dormant” piece of the hackers’ software. Google swiftly took those apps down.

Check Point believes an unnamed Chinese company based in Guangzhou has been building the malware while operating a business that helps Chinese Android developers promote their apps on overseas platforms.

Alibaba hadn’t responded to a request for comment on proliferation of malware on the 9apps platform at the time of publication.

What can you do?

So what can anxious Android owners do? Check Point’s head of cyber analysis and response, Aviran Hazum, said that if users experience advertisements displayed at odd times, such as when they open WhatsApp, they should take action.

First, go to Android settings, then the apps and notifications section. Next, got to the app info list and look for suspicious applications with names like Google Updater, Google Installer for U, Google Powers and Google Installer. Click the suspicious application and choose to uninstall it.

Otherwise, staying away from unofficial Android app stores might help, given Google’s extra protections designed to prevent malware from getting on the site. Not that Google’s efforts always pay off. Earlier this week, a warning went out about an Android malware spreading over Google Play that was screen-recording users’ banking sessions.
 
It amazes me that given how essential smart phones have a come to our daily lives and being essentially the master key to many entry points of our life, that people continue to use android phones - which are notorious for being hacked, prone to security flaws and trojan horse viruses.

I have not touched an Android phone since roughly 2008 and have absolutely no interest in ever doing so.
 
It amazes me that given how essential smart phones have a come to our daily lives and being essentially the master key to many entry points of our life, that people continue to use android phones - which are notorious for being hacked, prone to security flaws and trojan horse viruses.

I have not touched an Android phone since roughly 2008 and have absolutely no interest in ever doing so.

So many untruths.

People with phones that don't have the latest security updates are the problem. And that includes iOS.

Where u been at? iPhones get got too.
 
And the nigga lying anyway. The first phone using Android didn't even hit until September 2008. The first iPhone was June 2007. And that shit was barely usable and didn't even have 3G which was the standard at the time.
 
Ahhh no biggie twenty five million people

In India is like less than one percent of the population over there

The equivalent of two people:lol:
 
This is why I have a Pixel. Fuck these companies refusing to issue timely updates to their products.

Could still happen with a Pixel... best safeguard would be to stop downloading apps from these black market app stores. Also check reviews before downloading on the Google Play store.
 
Could still happen with a Pixel... best safeguard would be to stop downloading apps from these black market app stores. Also check reviews before downloading on the Google Play store.

agreed. but my point point was that there is less of a chance to get a zero day because pixels get security updates every month.

no other androids offer that.
 
So many untruths.

People with phones that don't have the latest security updates are the problem. And that includes iOS.

Where u been at? iPhones get got too.
Nigga must have forgot about all those celebrity nudes that leaked off iphones.


Was the fappening a result of the OS being hacked or dumb end users?

Happened so long ago but I don't remember the devices or the OS being compromised.
 
As many as 25 million Android phones have been hit with malware that replaces installed apps like WhatsApp with evil versions that serve up advertisements, cybersecurity researchers warned Wednesday.

Dubbed Agent Smith, the malware abuses previously known weaknesses in the Android operating system, making updating to the latest, patched version of Google’s operating system a priority, Israeli security company Check Point said.

Most victims are in India, where as many as 15 million were infected. But there are more than 300,000 in the U.S., with another 137,000 in the U.K., making this one of the more severe threats to have hit Google’s operating system recently.


The malware has spread via a third-party app store, 9apps.com, which is owned by China’s Alibaba, rather than the official Google Play store. Typically, such non-Google Play attacks focus on developing countries, making the hackers’ success in the U.S. and the U.K. more remarkable, Check Point said.

While the replaced apps will serve up malicious ads, whoever’s behind the hacks could do worse, Check Point warned in a blog. “Due to its ability to hide its icon from the launcher and impersonates any popular existing apps on a device, there are endless possibilities for this sort of malware to harm a user’s device,” the researchers wrote.


They said they’d warned Google and the relevant law enforcement agencies. Google hadn’t provided comment at the time of publication.

Typically the attack works as follows: Users download an app from the store—typically a photo utility, games or adult-themed apps (one called Kiss Game: Touch Her Heart is advertised with a cartoon of a man kissing a scantily clad woman). This app then silently installs the malware, disguised as a legitimate Google updating tool. No icon appears for this on the screen, making it even more surreptitious. Legitimate apps—from WhatsApp to the Opera browser and more—are then replaced with an evil update so they serve the bad ads. The researchers said the ads themselves weren’t malicious per se. But in a typical ad fraud scheme, every click on an injected advertisement will send money back to the hackers, as per a typical pay-per-click system.

There’s some indication that the attackers are considering moving to Google Play. The Check Point researchers said they’d found 11 apps on Google’s store that contained a “dormant” piece of the hackers’ software. Google swiftly took those apps down.

Check Point believes an unnamed Chinese company based in Guangzhou has been building the malware while operating a business that helps Chinese Android developers promote their apps on overseas platforms.

Alibaba hadn’t responded to a request for comment on proliferation of malware on the 9apps platform at the time of publication.

What can you do?

So what can anxious Android owners do? Check Point’s head of cyber analysis and response, Aviran Hazum, said that if users experience advertisements displayed at odd times, such as when they open WhatsApp, they should take action.

First, go to Android settings, then the apps and notifications section. Next, got to the app info list and look for suspicious applications with names like Google Updater, Google Installer for U, Google Powers and Google Installer. Click the suspicious application and choose to uninstall it.

Otherwise, staying away from unofficial Android app stores might help, given Google’s extra protections designed to prevent malware from getting on the site. Not that Google’s efforts always pay off. Earlier this week, a warning went out about an Android malware spreading over Google Play that was screen-recording users’ banking sessions.

Link please?
 
Has iOS ever been compromised?

I don't recall an instance of this happening.

stop believing the marketing....... clearly it is very effective.


iOS Devices Compromised AGAIN

June 26, 2019

The Media Trust has uncovered malicious campaigns streaming through one of the world’s largest global demand-side (DSP) adtech providers. The team detected the attacks while monitoring premium websites and mobile apps on devices using iOS version 12. Hiding within a PNG file to escape detection and persist, the malware behind the attack, named Stegoware-3PC by the Digital Security & Operations (DSO) team, automatically redirects site visitors to a phishing scam. At least five top-tier publishers, three demand-side vendors, and 11 other adtech vendors were exploited to serve malware to tens of millions of consumers.

This phishing scam masquerades as ads from a well-known e-commerce retailer, an outdoor apparel manufacturer, or other widely known brands. The ads prompt visitors to shop and, in so doing, enter their personal information. The malware exfiltrates the information and sends it to a malicious command and control server.

https://www.informationsecuritybuzz.com/articles/ios-devices-compromised-again/
 
Android users around the world:

That’s cool. You found a video! You win!

I’ll just stay over here with my very secure phone, that doesn’t sell my data, have a virus or hack problem every year, that doesn’t occasional double as a thermite grenade and burn down my car / house.
 
That’s cool. You found a video! You win!

I’ll just stay over here with my very secure phone, that doesn’t sell my data, have a virus or hack problem every year, that doesn’t occasional double as a thermite grenade and burn down my car / house.
Fyi, that had nothing to do with the OS.

And Apple is not that secure.

Enjoy.
 
stop believing the marketing....... clearly it is very effective.


iOS Devices Compromised AGAIN

June 26, 2019

The Media Trust has uncovered malicious campaigns streaming through one of the world’s largest global demand-side (DSP) adtech providers. The team detected the attacks while monitoring premium websites and mobile apps on devices using iOS version 12. Hiding within a PNG file to escape detection and persist, the malware behind the attack, named Stegoware-3PC by the Digital Security & Operations (DSO) team, automatically redirects site visitors to a phishing scam. At least five top-tier publishers, three demand-side vendors, and 11 other adtech vendors were exploited to serve malware to tens of millions of consumers.

This phishing scam masquerades as ads from a well-known e-commerce retailer, an outdoor apparel manufacturer, or other widely known brands. The ads prompt visitors to shop and, in so doing, enter their personal information. The malware exfiltrates the information and sends it to a malicious command and control server.

https://www.informationsecuritybuzz.com/articles/ios-devices-compromised-again/
That’s not an iOS vulnerability. The article clearly stated it’s a phishing scam. Phishing scams happen off the device on a separate server where an unobservant user visits a fake website and enters their own information that will then be captured used by whomever is running the site.

If you clicked on a scam ad and were taken to BGOL.tv, then put your information in, how is that a BGOL.us venerability? :lol
 
That’s cool. You found a video! You win!

I’ll just stay over here with my very secure phone, that doesn’t sell my data, have a virus or hack problem every year, that doesn’t occasional double as a thermite grenade and burn down my car / house.

stop lying dude.

The first phone using Android didn't even hit until September 2008. The first iPhone was June 2007. And that shit was barely usable and didn't even have 3G which was the standard at the time.
 
Link please?

https://www.forbes.com/sites/thomas...-malware-that-hides-in-whatsapp/#17ab09ff4470

stop believing the marketing....... clearly it is very effective.


iOS Devices Compromised AGAIN

June 26, 2019

The Media Trust has uncovered malicious campaigns streaming through one of the world’s largest global demand-side (DSP) adtech providers. The team detected the attacks while monitoring premium websites and mobile apps on devices using iOS version 12. Hiding within a PNG file to escape detection and persist, the malware behind the attack, named Stegoware-3PC by the Digital Security & Operations (DSO) team, automatically redirects site visitors to a phishing scam. At least five top-tier publishers, three demand-side vendors, and 11 other adtech vendors were exploited to serve malware to tens of millions of consumers.

This phishing scam masquerades as ads from a well-known e-commerce retailer, an outdoor apparel manufacturer, or other widely known brands. The ads prompt visitors to shop and, in so doing, enter their personal information. The malware exfiltrates the information and sends it to a malicious command and control server.

https://www.informationsecuritybuzz.com/articles/ios-devices-compromised-again/

I don't buy into marketing hype.

I also know the difference between

This sounds like a phishing scam, not a trojan horse on the OS.

Would you like to try to find another link?
 
Fyi, that had nothing to do with the OS.

And Apple is not that secure.

Enjoy.
I know.
Android phones leave much to be desired from a hardware perspective. That was my point.

The three major manufacturers always rushing the pump out new phones without adequately testing their product. Remember the galaxy note that would brick itself if you put the stylus back in. Or all the failures of their new folding screen phone.

They were still using cheap plastics for the body up until 2014 or 15
 
That’s not an iOS vulnerability. The article clearly stated it’s a phishing scam. Phishing scams happen off the device on a separate server where an unobservant user visits a fake website and enters their own information that will then be captured used by whomever is running the site.

If you clicked on a scam ad and were taken to BGOL.tv, then put your information in, how is that a BGOL.us venerability? :lol

are u really splitting hairs?

most systems are compromised by phishing. and the iOS device is still compromised from software on the device. cmon son.
 
Would you like to try to find another link?


ok. for you and @Heist

iPhone hacked but Apple does not want you to know

15 MAY 2019

The Tame Apple Press has discovered much to its shock that the iPhone could be easily hacked and they would never know.

The previously unknown vulnerability in the popular messaging app WhatsApp has highlighted a huge flaw in iPhones.

According to Vice, the issue is that the iOS is so locked down it is impossible for anyone to find out if their iPhone has been hacked.

“The simple reality is there are so many 0-day exploits for iOS”, Stefan Esser, a security researcher that specializes in iOS, wrote on Twitter. “And the only reason why just a few attacks have been caught in the wild is that iOS phones by design hinder defenders to inspect the phones.”


There is no specific tool that an iPhone user can download to analyse their phone and figure out if it has been compromised. In fact, Apple insists that it will sue anyone who tries to write such code. In 2016, Apple took down an app made by Esser that was specifically designed to detect malicious jailbreaks.

https://www.fudzilla.com/news/mobile/48693-iphone-hacked-but-apple-does-not-want-you-to-know
 
ok. for you and @Heist

iPhone hacked but Apple does not want you to know

15 MAY 2019

The Tame Apple Press has discovered much to its shock that the iPhone could be easily hacked and they would never know.

The previously unknown vulnerability in the popular messaging app WhatsApp has highlighted a huge flaw in iPhones.

According to Vice, the issue is that the iOS is so locked down it is impossible for anyone to find out if their iPhone has been hacked.

“The simple reality is there are so many 0-day exploits for iOS”, Stefan Esser, a security researcher that specializes in iOS, wrote on Twitter. “And the only reason why just a few attacks have been caught in the wild is that iOS phones by design hinder defenders to inspect the phones.”


There is no specific tool that an iPhone user can download to analyse their phone and figure out if it has been compromised. In fact, Apple insists that it will sue anyone who tries to write such code. In 2016, Apple took down an app made by Esser that was specifically designed to detect malicious jailbreaks.

https://www.fudzilla.com/news/mobile/48693-iphone-hacked-but-apple-does-not-want-you-to-know

Thanks for the link.


Is this the same to you as Android apps running unauthorized Play Stores with compromised apps?

I agree no system is 100% full proof but this is a reach and no way near comparable to this issue these 25 million users are having.
 
@Heist @thismybgolname

did yall forget about this so soon???

Major iPhone FaceTime bug lets you hear the audio of the person you are calling … before they pick up

Jan. 28th 2019

A significant bug has been discovered in FaceTime and is currently spreading virally over social media. The bug lets you call anyone with FaceTime, and immediately hear the audio coming from their phone — before the person on the other end has accepted or rejected the incoming call. Apple says the issue will be addressed in a software update “later this week”.

Naturally, this poses a pretty big privacy problem as you can essentially listen in on any iOS user, although it still rings like normal, so you can’t be 100% covert about it. Nevertheless, there is no indication on the recipient’s side that you could hear any of their audio. There’s a second part to this which can expose video too …

9to5Mac has reproduced the FaceTime bug with an iPhone X calling an iPhone XR, but it is believed to affect any pair of iOS devices running iOS 12.1 or later.

https://9to5mac.com/2019/01/28/facetime-bug-hear-audio/
 
Back
Top