The experts of ESET telemetry have recently declared that the attack rate of Stalkerware for Android is increasing rapidly. As per the report of 2020, nearly 48% of attacks have increased as compared to the 2019 attack rate.
However, Stalkerware generally monitors the GPS location of victims’ devices, conversations, pictures, browser history, and many more. Not only this the analysts also claimed that Stalkerware also stores and transmits all this data as per their requirements.
Stalkerware apps have become quite popular in the last couple of years, and in a regular investigation, the security researchers found that some Stalkerware keeps a lot of data regarding the stalkers, using the app and collecting all the data of victims’ on a server.
The security specialists at ESET have detected a total of 158 privacy and security issues in 58 Android Stalkware apps.
All these issues belong to several vendors that are enabling the threat actors to take control of a victim’s device, and later they can hijack a stalker’s account, administer remote code execution, intercept data, and the hackers can also frame the victim by uploading counterfeit evidence.
As we told that the researchers have discovered 158 security and privacy issues in 58 Stalkerware apps, and all these issues were ordered as per the prevalence of their occurrence, which has been found in the scrutinize Stalkerware.
However, after a proper analysis, the analysts have asserted that in this type of attack, the stalker counterspy upon the victims through the Stalkerware.
Here we have mentioned below all the widespread issues:-
The cybersecurity authorities have warned all the potential future clients of Stalkerware, regarding the usage of the software against their partners and loved ones.
Apart from this, they have also detected that there are some Stalkerware that are keeping information about the stalkers just by using the app and collected the data of their victim on a server.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…