Wednesday, April 24, 2024

Beware!! Hackers Using Facebook Profiles to Trick the User’s in Downloading Android Spyware

Hackers using attractive fake Facebook profiles to trick the users into downloading Android Tempting Cedar Spyware that can steal pieces of information like contacts, call logs, SMS, and photos, as well as device information, like geolocation.

They use fake Facebook profiles of attractive women to spread the spyware, disguised as Kik Messenger app from a very convincing phishing site chat-messenger[.]site.

Researchers from Avast detected the Tempting Cedar Spyware Android: SpyAgent-YP [Trj] and they believe the spyware is operated from Lebanese.

The Spywares was distributed with three Facebook profiles and the victims are mostly young people, the attackers engaging the victims in flirty conversations and ask them to install another messenger app for secure and private communication which is the spyware.
Tempting Cedar Spyware
Image Describing campaign
CREDITS : AVAST

Once the malicious apps installed, it will immediately establish communication with C&C server to receive commands. Also, the spyware is persistent one which can run after every reboot.

Also Read Hackers Spreading Cryptocurrency Mining scripts via videos that Embedded in MS Office Word Documents

The Tempting Cedar Spyware consists of following modules to gather to track and gather information from victims, including contacts, photos, call logs, SMS, as well as information about the mobile device, such as geolocation, Android version, device model, network operator, and phone numbers.

The malware communicated through TCP port 2020 and the C&C console that used to track victims runs on port 443.

WHOIS data of the site Chat-world[.]site revealed it was registered by someone in Lebanon. Majority of the victims from the Middle East and most of them from Israel.

Tempting Cedar Spyware
Victim’s Geolocation

Researchers concluded that Tempting Cedar campaign has been running under the radar since as far back as 2015, targeting people in Middle Eastern countries. The spyware’s infection vector involves social engineering using attractive, but fictitious Facebook profiles.

You can find the IOCs in Avast post.

Common Defences and Mitigations

Researchers from Checkpoint notified to google and the affected apps removed now.

  • Give careful consideration to the permission asked for by applications.
  • Download applications from trusted sources.
  • Stay up with the latest version.
  • Encrypt your devices.
  • Make frequent backups of important data.
  • Install anti-malware on their devices.
  • Stay strict with CIA Cycle.
Website

Latest articles

Researchers Uncover that UK.GOV Websites Sending Data to Chinese Ad Vendor Analysts

Analysts from Silent Push, a data analytics firm, have uncovered several UK government websites...

Ransomware Victims Who Opt To Pay Ransom Hits Record Low

Law enforcement operations disrupted BlackCat and LockBit RaaS operations, including sanctions on LockBit members...

IBM Nearing Talks to Acquire Cloud-software Provider HashiCorp

IBM is reportedly close to finalizing negotiations to acquire HashiCorp, a prominent cloud infrastructure...

Rewards Up to $10 Million for Information on Iranian Hackers

The United States Justice Department has announced big rewards for information leading to the...

PoC Exploit Released For Critical Oracle VirtualBox Vulnerability

Oracle Virtualbox was identified and reported as having a critical vulnerability associated with Privilege...

Tracing the Steps of Cyber Intruders: The Path of Lateral Movement

When cyber attacks strike, it's rarely a single computer that suffers. Nowadays, cybercriminals set...

U.S. to Impose Visa Restrictions on 13 Individuals Involved in Commercial Spyware Operations

To combat the misuse of commercial spyware, the United States Department of State has...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles