#android-spyware

[ follow ]
Information security
fromThe Hacker News
3 weeks ago

Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

Cybercrime is evolving: attackers use hidden hypervisor-based VMs, AI side-channel leaks, sleeper logic bombs, and stealthy Android spyware with increasing coordination.
fromTheregister
3 weeks ago

Landfall spyware used in 0-day attacks on Samsung phones

A previously unknown Android spyware family called LANDFALL exploited a zero-day in Samsung Galaxy devices for nearly a year, installing surveillance code capable of recording calls, tracking locations, and harvesting photos and logs before Samsung finally patched it in April. The surveillance campaign likely began in July 2024 and abused CVE-2025-21042, a critical bug in Samsung's image-processing library that affects Galaxy devices running Android versions 13, 14, 15, and 16,
Information security
Information security
fromTechCrunch
3 weeks ago

'Landfall' spyware abused zero-day to hack Samsung Galaxy phones | TechCrunch

Landfall, an Android spyware, exploited a Samsung Galaxy zero-day to conduct precision espionage attacks on specific individuals, likely in the Middle East.
fromThe Hacker News
1 month ago

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps

A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike phishing websites by impersonating popular apps like WhatsApp, Google Photos, TikTok, and YouTube as lures to install them. "Once active, the spyware can exfiltrate SMS messages, call logs, notifications, and device information; taking photos with the front camera; and even send SMS messages or place calls directly from the victim's device," Zimperium researcher Vishnu Pratapagiri said in a report shared with The Hacker News.
Information security
fromThe Hacker News
1 month ago

Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro

Slovak cybersecurity company ESET said the malicious apps are distributed via fake websites and social engineering to trick unsuspecting users into downloading them. Once installed, both the spyware malware strains establish persistent access to compromised Android devices and exfiltrate data. "Neither app containing the spyware was available in official app stores; both required manual installation from third-party websites posing as legitimate services," ESET researcher Lukáš Štefanko said. Notably, one of the websites distributing the ToSpy malware family mimicked the Samsung Galaxy Store, luring users into manually downloading and installing a malicious version of the ToTok app.
Information security
Information security
fromLifehacker
2 months ago

This Android Malware Is Spreading Through Facebook Ads

Customize Google searches and add trusted sources like Lifehacker; beware Facebook malvertising delivering Brokewell Android spyware via cloned TradingView ads.
[ Load more ]