Among the latest of several new threats targeting proprietary information is a brand new FakeSpy campaign aimed at Android users.
"In addition to this malware strain stealing an array of information the device it infects, it also, creates and sends SMS to other devices. This capability enables any threat actor to spread the malware throughout the victim's own contact list," warns Jeremy Samide whose Stealthcare introduced ZeroDay Live, which has become the most powerful threat intelligence platforms developed to date.
Apart from infecting smart phones, new evidence points to a low-cost Android phone being shipped with preinstalled malware, according to Samide, whose cybersecurity team often relies on tradecraft to ferret out these kinds of threats. "The Android uleFone S8 Pro ships with a sound recorder application that is actually a malicious variant with possessing capabilities that align it with a remote access Trojan. The malicious code transfers myriad information to attacker-controlled servers, including location, phone number, IMEI identifier number, MAC address, and more."
The preinstalled malware can also perform backdoor functions such as downloading applications, and executing shell commands, say Stealthcare sources.
These examples illustrate the length to which threat actors will go to obtain sensitive data. "Threat actors come in all shapes and sizes with motivations...