However, starting in 2020, it periodically redirected users to a malicious domain that delivered an infected version of the app. This version included a script that installed two executables on the device, creating a persistent backdoor.

Once activated, the backdoor launched a reverse shell that allowed attackers to control the device remotely. Kaspersky Lab security researchers, who discovered the malware, analyzed its behavior. The program collected sensitive data such as system information, browsing history, passwords, and even credentials for cloud services such as AWS, Google Cloud, and Azure. This information was then uploaded to the attackers’ infrastructure.

This incident highlights the importance of being careful when downloading software and regularly updating protection against such threats.

Source: Ferra

Previous articleGoogle’s emoji creator now available in browserApps13:05 | September 14, 2023
Next articleTinkoff Bank intends to launch overnight yuan foreign exchange operations
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.

LEAVE A REPLY

Please enter your comment!
Please enter your name here