Wednesday, February 5, 2025

Mobile Attacks

MysteryBot – Powerful Android Banking Trojan Launch Keylogger, Overlay & Ransomware in Single Attack

Newly Discovered Android-based MysteryBot Trojan launches various attack such as overlay, keylogger, and Ransomware in a single attack to perform various malicious activities.Based on...

InvisiMole – A Powerful Spyware Turn On Your Camera & Record Video, Audio, Take Picture

Newly discovered powerful InvisiMole Spyware attack targeted computer to turn on the video camera and record the videos, audio to hear whatever things happening to surround...

Hackers Earning Money from Invisible Ads using Android Trojan that Downloads 6.5 Million Times via Google Play

A powerful Android Trojan distributed through Google Play store apps that posed as Fashion and game apps to generate a huge revenue using malicious invisible...

Serious iOS Bug – A Single Text Character Can Crash any Apple iPhone, Mac or iPad

A single character can crash iPhone if it simply pasted in the text field, received as a message via apps like Facebook Messenger, WhatsApp, etc...

New “GnatSpy” Mobile Malware Stealing data Such as Images, Text messages, Contacts, and Call History

A newly emerging mobile malware GnatSpy capable of abusing infected mobile and stealing various type of data such Images, Text messages, Contacts, and Call...

New Android Banking Trojan “RED ALERT 2.0” Targeting 60 Banks and Social Apps

A new Banking Trojan called "RED ALERT 2.0" Targeting  Around 60 Banks and Social Media Android Apps by using overlay attacks same as Most...

A Mobile Ransomware Called “LeakerLocker” Found in Google Play Store Which Leaks Phone’s Sensitive Information and Demand to Pay

Mobile Ransomware called LeakerLocker Found in Google Playstore which infect the Android Mobile user and steals the information such as contact Phone numbers, Phone...

Millions of Android Phones including latest Versions Vulnerable to Cloak & Dagger attack

Cloak & Dagger attack discovered by security experts from Georgia Institute of Technology, which allows attackers to get complete control over your device.These attack...