One Article Review

Accueil - L'article:
Source SecurityWeek.webp SecurityWeek
Identifiant 514802
Date de publication 2018-03-15 03:01:04 (vue: 2018-03-15 03:01:04)
Titre New “HenBox” Android Malware Discovered
Texte A newly discovered Android malware family masquerades as various popular applications and can steal a broad range of information from infected devices, Palo Alto Networks warns. Dubbed HenBox, the malware was observed installing the legitimate versions of apps it poses as to hide its presence on compromised devices. The threat is distributed via third-party app stores and mainly targets Uyghur, a minority Turkic ethnic group in the Xinjiang Uyghur Autonomous Region in North West China, and Xiaomi devices. On the infected devices, HenBox can steal information from mainstream chat, communication, and social media apps. It gathers both personal and device information, can track the device's location, can access the microphone and camera, and harvests outgoing phone numbers with an “86” prefix (the country code for the People's Republic of China). Palo Alto's researchers discovered nearly 200 HenBox samples, the oldest dating back to 2015, but activity occured in the second half of 2017. A small but consistent number of samples has been observed this year as well. While analyzing the mobile threat, Palo Alto connected
Notes
Envoyé Oui
Condensat 2018 active ads android attacks backdoor decade discovered flaws found industry links malware march mobile new news oceanlotus old patches recent sap security spies sponsored t46 tags: use “henbox”
Tags
Stories APT 32
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: