ESET security researchers discovered (what they allege) two separate Chinese spy campaigns targeting US and European Android users. Their strategy involves the creation of counterfeit versions of popular encrypted messaging apps, Signal and Telegram, both readily available on the Google Play Store. The primary objective behind these bogus applications is to compromise the security of Android users.
Attributed to a threat group suspected to be aligned with China, known as GREF, these fraudulent apps closely mimic the appearance and functionality of the genuine Signal and Telegram apps. However, beneath this deceptive facade lies malicious software capable of unauthorised data access and message interception.
Notably, this malware was previously employed to target specific ethnic minority groups within China. In this latest campaign, the hackers have expanded their scope to target a broader user base.
Register Email now for Weekly Promotion Stock
100% free, Unsubscribe any time!Add 1: Room 605 6/F FA YUEN Commercial Building, 75-77 FA YUEN Street, Mongkok KL, HongKong Add 2: Room 405, Building E, MeiDu Building, Gong Shu District, Hangzhou City, Zhejiang Province, China
Whatsapp/Tel: +8618057156223 Tel: 0086 571 86729517 Tel in HK: 00852 66181601
Email: [email protected]