SlideShare a Scribd company logo
Google removes fake Signal
and Telegram apps hosted on
Play
Researchers discovered bogus apps for the Signal and Telegram communications services in
Google Play on Wednesday, according to reports. When users performed specific activities, the
malicious apps could steal messages or other private information from legitimate accounts.
Before Google removed a Signal Plus Messenger app from Play last April after receiving a tip
from security company ESET, the software had been available on Play for nine months and had
been downloaded there about 100 times. It was also accessible on signal plus[.]org, a dedicated
website that resembled the original Signal.org, and on the Samsung app store. Meanwhile, the
same threat actor also developed the FlyGram app, which was accessible through the same three
methods. Google took it down from Play.
Trojan has been connected to the GREF hacking gang
Both applications were created using open source technology from Signal and Telegram. An
intelligence gathering mechanism known as BadBazaar was incorporated into that code. The
Trojan has been connected to the GREF hacking gang, which is associated with China. Uyghurs
and other Turkic ethnic minorities have historically been targeted by BadBazaar. A Uyghur
Telegram group also disseminated the FlyGram malware, further connecting it to prior
BadBazaar malware family targets.
If users connected their infected smartphone to their real Signal number, as is typical when
someone initially instals Signal on their device, Signal Plus could monitor sent and received
messages as well as contacts.
When this happened, the malicious app sent the attacker a ton of personal data, including the
device’s IMEI number, phone number, MAC address, operator information, location data, Wi-Fi
information, emails for Google accounts, contact information, and, in the event that one had been
set up by the user, a PIN used to send texts.
Exclusively for specifically targeted people
The creators of Signal have been alerted of this weakness by ESET Research. Threat actors can
modify the code of any messaging app and advertise it in a fraudulent or misleading way,
according to the encrypted messaging service. In this scenario, the fake Signal and Telegram
client could easily block that code path to avoid the warning and hide if the official Signal clients
were to show a notification everytime a new device is joined to the account.
Downloading only authentic versions of such programs, only from official sources, is the best
way to avoid falling prey to a fake Signal—or any other malicious messaging app.
According to the information previously given by the malware to the C&C server, the server
hasn’t returned to the device a URI for linking throughout our research, indicating this is likely
enabled exclusively for specifically targeted people.

More Related Content

Similar to Google removes fake Signal and Telegram apps hosted on Play.pdf

Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
IOSR Journals
 
G data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_usG data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_us
linkedinbeam
 
pegasus spyware
pegasus spywarepegasus spyware
Null pune 1st March-news bytes
Null pune 1st March-news bytesNull pune 1st March-news bytes
Null pune 1st March-news bytes
n|u - The Open Security Community
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
EMC
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Corporation
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
Anjoum .
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
Saad Ahmad
 
Panda labs annual report 2012
Panda labs annual report 2012Panda labs annual report 2012
Panda labs annual report 2012
Itex Solutions
 
Mobile threatreport q1_2012
Mobile threatreport q1_2012Mobile threatreport q1_2012
Mobile threatreport q1_2012Shivmohan Yadav
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
EMC
 
Meet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis ReportMeet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis Report
Eran Goldstein
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdf
venkatprasadvadla1
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon Berlin
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone SecurityGuneet Pahwa
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
Felipe Prado
 

Similar to Google removes fake Signal and Telegram apps hosted on Play.pdf (20)

Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
 
G data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_usG data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_us
 
pegasus spyware
pegasus spywarepegasus spyware
pegasus spyware
 
Null pune 1st March-news bytes
Null pune 1st March-news bytesNull pune 1st March-news bytes
Null pune 1st March-news bytes
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Dragonfly.pdf
Dragonfly.pdfDragonfly.pdf
Dragonfly.pdf
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
Panda labs annual report 2012
Panda labs annual report 2012Panda labs annual report 2012
Panda labs annual report 2012
 
Panda labs annual-report-2012
Panda labs annual-report-2012Panda labs annual-report-2012
Panda labs annual-report-2012
 
Mobile threatreport q1_2012
Mobile threatreport q1_2012Mobile threatreport q1_2012
Mobile threatreport q1_2012
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
 
Meet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis ReportMeet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis Report
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdf
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 

More from Enterprise Wired

Optimizing Operations_ The Role of Energy Data Management in Sustainable Prac...
Optimizing Operations_ The Role of Energy Data Management in Sustainable Prac...Optimizing Operations_ The Role of Energy Data Management in Sustainable Prac...
Optimizing Operations_ The Role of Energy Data Management in Sustainable Prac...
Enterprise Wired
 
Harnessing Collective Wisdom_ The Power of Collaborative Decision-making.pdf
Harnessing Collective Wisdom_ The Power of Collaborative Decision-making.pdfHarnessing Collective Wisdom_ The Power of Collaborative Decision-making.pdf
Harnessing Collective Wisdom_ The Power of Collaborative Decision-making.pdf
Enterprise Wired
 
Elon Musk’s Vision of AI-Driven Job Disruption.pdf
Elon Musk’s Vision of AI-Driven Job Disruption.pdfElon Musk’s Vision of AI-Driven Job Disruption.pdf
Elon Musk’s Vision of AI-Driven Job Disruption.pdf
Enterprise Wired
 
Understanding the Diverse Types of Market Segmentation.pdf
Understanding the Diverse Types of Market Segmentation.pdfUnderstanding the Diverse Types of Market Segmentation.pdf
Understanding the Diverse Types of Market Segmentation.pdf
Enterprise Wired
 
Exploring the Advantages of Online Public Schools for Modern Education.pdf
Exploring the Advantages of Online Public Schools for Modern Education.pdfExploring the Advantages of Online Public Schools for Modern Education.pdf
Exploring the Advantages of Online Public Schools for Modern Education.pdf
Enterprise Wired
 
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfUnleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Enterprise Wired
 
How to Successfully Master the PHP Development Tools.pdf
How to Successfully Master the PHP Development Tools.pdfHow to Successfully Master the PHP Development Tools.pdf
How to Successfully Master the PHP Development Tools.pdf
Enterprise Wired
 
Global Health Equity by Johnson & Johnson.pdf
Global Health Equity by Johnson & Johnson.pdfGlobal Health Equity by Johnson & Johnson.pdf
Global Health Equity by Johnson & Johnson.pdf
Enterprise Wired
 
Navigating the Health Insurance Market_ Understanding Trends and Options.pdf
Navigating the Health Insurance Market_ Understanding Trends and Options.pdfNavigating the Health Insurance Market_ Understanding Trends and Options.pdf
Navigating the Health Insurance Market_ Understanding Trends and Options.pdf
Enterprise Wired
 
Dynamic Learning Maps_ What You Should Know.pdf
Dynamic Learning Maps_ What You Should Know.pdfDynamic Learning Maps_ What You Should Know.pdf
Dynamic Learning Maps_ What You Should Know.pdf
Enterprise Wired
 
Landmark Discovery_ Ancient Black Hole Collision Unveiled.pdf
Landmark Discovery_ Ancient Black Hole Collision Unveiled.pdfLandmark Discovery_ Ancient Black Hole Collision Unveiled.pdf
Landmark Discovery_ Ancient Black Hole Collision Unveiled.pdf
Enterprise Wired
 
Harnessing the Power of Data-Driven Decision Making.pdf
Harnessing the Power of Data-Driven Decision Making.pdfHarnessing the Power of Data-Driven Decision Making.pdf
Harnessing the Power of Data-Driven Decision Making.pdf
Enterprise Wired
 
Reddit Surges on OpenAI Partnership, AI Integration on the Horizon.pdf
Reddit Surges on OpenAI Partnership, AI Integration on the Horizon.pdfReddit Surges on OpenAI Partnership, AI Integration on the Horizon.pdf
Reddit Surges on OpenAI Partnership, AI Integration on the Horizon.pdf
Enterprise Wired
 
Nurturing Partnerships_ The Importance of Supplier Relationship Management.pdf
Nurturing Partnerships_ The Importance of Supplier Relationship Management.pdfNurturing Partnerships_ The Importance of Supplier Relationship Management.pdf
Nurturing Partnerships_ The Importance of Supplier Relationship Management.pdf
Enterprise Wired
 
Nurturing Wellness_ Exploring Inpatient Mental Health Care.pdf
Nurturing Wellness_ Exploring Inpatient Mental Health Care.pdfNurturing Wellness_ Exploring Inpatient Mental Health Care.pdf
Nurturing Wellness_ Exploring Inpatient Mental Health Care.pdf
Enterprise Wired
 
How to Boost Your Online Presence_ Choosing the Right Post Scheduler for Inst...
How to Boost Your Online Presence_ Choosing the Right Post Scheduler for Inst...How to Boost Your Online Presence_ Choosing the Right Post Scheduler for Inst...
How to Boost Your Online Presence_ Choosing the Right Post Scheduler for Inst...
Enterprise Wired
 
Facilitating Knowledge Exchange_ The Role of Collaborative Learning Centers.pdf
Facilitating Knowledge Exchange_ The Role of Collaborative Learning Centers.pdfFacilitating Knowledge Exchange_ The Role of Collaborative Learning Centers.pdf
Facilitating Knowledge Exchange_ The Role of Collaborative Learning Centers.pdf
Enterprise Wired
 
Engineering Data Management_ Optimizing Processes and Performance in Engineer...
Engineering Data Management_ Optimizing Processes and Performance in Engineer...Engineering Data Management_ Optimizing Processes and Performance in Engineer...
Engineering Data Management_ Optimizing Processes and Performance in Engineer...
Enterprise Wired
 
Unlocking Insights_ The Importance and Techniques of Non-Destructive Examinat...
Unlocking Insights_ The Importance and Techniques of Non-Destructive Examinat...Unlocking Insights_ The Importance and Techniques of Non-Destructive Examinat...
Unlocking Insights_ The Importance and Techniques of Non-Destructive Examinat...
Enterprise Wired
 
Aurora Borealis_ Anticipated Sky Show.pdf
Aurora Borealis_ Anticipated Sky Show.pdfAurora Borealis_ Anticipated Sky Show.pdf
Aurora Borealis_ Anticipated Sky Show.pdf
Enterprise Wired
 

More from Enterprise Wired (20)

Optimizing Operations_ The Role of Energy Data Management in Sustainable Prac...
Optimizing Operations_ The Role of Energy Data Management in Sustainable Prac...Optimizing Operations_ The Role of Energy Data Management in Sustainable Prac...
Optimizing Operations_ The Role of Energy Data Management in Sustainable Prac...
 
Harnessing Collective Wisdom_ The Power of Collaborative Decision-making.pdf
Harnessing Collective Wisdom_ The Power of Collaborative Decision-making.pdfHarnessing Collective Wisdom_ The Power of Collaborative Decision-making.pdf
Harnessing Collective Wisdom_ The Power of Collaborative Decision-making.pdf
 
Elon Musk’s Vision of AI-Driven Job Disruption.pdf
Elon Musk’s Vision of AI-Driven Job Disruption.pdfElon Musk’s Vision of AI-Driven Job Disruption.pdf
Elon Musk’s Vision of AI-Driven Job Disruption.pdf
 
Understanding the Diverse Types of Market Segmentation.pdf
Understanding the Diverse Types of Market Segmentation.pdfUnderstanding the Diverse Types of Market Segmentation.pdf
Understanding the Diverse Types of Market Segmentation.pdf
 
Exploring the Advantages of Online Public Schools for Modern Education.pdf
Exploring the Advantages of Online Public Schools for Modern Education.pdfExploring the Advantages of Online Public Schools for Modern Education.pdf
Exploring the Advantages of Online Public Schools for Modern Education.pdf
 
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfUnleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
 
How to Successfully Master the PHP Development Tools.pdf
How to Successfully Master the PHP Development Tools.pdfHow to Successfully Master the PHP Development Tools.pdf
How to Successfully Master the PHP Development Tools.pdf
 
Global Health Equity by Johnson & Johnson.pdf
Global Health Equity by Johnson & Johnson.pdfGlobal Health Equity by Johnson & Johnson.pdf
Global Health Equity by Johnson & Johnson.pdf
 
Navigating the Health Insurance Market_ Understanding Trends and Options.pdf
Navigating the Health Insurance Market_ Understanding Trends and Options.pdfNavigating the Health Insurance Market_ Understanding Trends and Options.pdf
Navigating the Health Insurance Market_ Understanding Trends and Options.pdf
 
Dynamic Learning Maps_ What You Should Know.pdf
Dynamic Learning Maps_ What You Should Know.pdfDynamic Learning Maps_ What You Should Know.pdf
Dynamic Learning Maps_ What You Should Know.pdf
 
Landmark Discovery_ Ancient Black Hole Collision Unveiled.pdf
Landmark Discovery_ Ancient Black Hole Collision Unveiled.pdfLandmark Discovery_ Ancient Black Hole Collision Unveiled.pdf
Landmark Discovery_ Ancient Black Hole Collision Unveiled.pdf
 
Harnessing the Power of Data-Driven Decision Making.pdf
Harnessing the Power of Data-Driven Decision Making.pdfHarnessing the Power of Data-Driven Decision Making.pdf
Harnessing the Power of Data-Driven Decision Making.pdf
 
Reddit Surges on OpenAI Partnership, AI Integration on the Horizon.pdf
Reddit Surges on OpenAI Partnership, AI Integration on the Horizon.pdfReddit Surges on OpenAI Partnership, AI Integration on the Horizon.pdf
Reddit Surges on OpenAI Partnership, AI Integration on the Horizon.pdf
 
Nurturing Partnerships_ The Importance of Supplier Relationship Management.pdf
Nurturing Partnerships_ The Importance of Supplier Relationship Management.pdfNurturing Partnerships_ The Importance of Supplier Relationship Management.pdf
Nurturing Partnerships_ The Importance of Supplier Relationship Management.pdf
 
Nurturing Wellness_ Exploring Inpatient Mental Health Care.pdf
Nurturing Wellness_ Exploring Inpatient Mental Health Care.pdfNurturing Wellness_ Exploring Inpatient Mental Health Care.pdf
Nurturing Wellness_ Exploring Inpatient Mental Health Care.pdf
 
How to Boost Your Online Presence_ Choosing the Right Post Scheduler for Inst...
How to Boost Your Online Presence_ Choosing the Right Post Scheduler for Inst...How to Boost Your Online Presence_ Choosing the Right Post Scheduler for Inst...
How to Boost Your Online Presence_ Choosing the Right Post Scheduler for Inst...
 
Facilitating Knowledge Exchange_ The Role of Collaborative Learning Centers.pdf
Facilitating Knowledge Exchange_ The Role of Collaborative Learning Centers.pdfFacilitating Knowledge Exchange_ The Role of Collaborative Learning Centers.pdf
Facilitating Knowledge Exchange_ The Role of Collaborative Learning Centers.pdf
 
Engineering Data Management_ Optimizing Processes and Performance in Engineer...
Engineering Data Management_ Optimizing Processes and Performance in Engineer...Engineering Data Management_ Optimizing Processes and Performance in Engineer...
Engineering Data Management_ Optimizing Processes and Performance in Engineer...
 
Unlocking Insights_ The Importance and Techniques of Non-Destructive Examinat...
Unlocking Insights_ The Importance and Techniques of Non-Destructive Examinat...Unlocking Insights_ The Importance and Techniques of Non-Destructive Examinat...
Unlocking Insights_ The Importance and Techniques of Non-Destructive Examinat...
 
Aurora Borealis_ Anticipated Sky Show.pdf
Aurora Borealis_ Anticipated Sky Show.pdfAurora Borealis_ Anticipated Sky Show.pdf
Aurora Borealis_ Anticipated Sky Show.pdf
 

Recently uploaded

Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
narasimhamurthyh4
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
Any kyc Account
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Lviv Startup Club
 

Recently uploaded (20)

Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
 

Google removes fake Signal and Telegram apps hosted on Play.pdf

  • 1. Google removes fake Signal and Telegram apps hosted on Play Researchers discovered bogus apps for the Signal and Telegram communications services in Google Play on Wednesday, according to reports. When users performed specific activities, the malicious apps could steal messages or other private information from legitimate accounts. Before Google removed a Signal Plus Messenger app from Play last April after receiving a tip from security company ESET, the software had been available on Play for nine months and had been downloaded there about 100 times. It was also accessible on signal plus[.]org, a dedicated website that resembled the original Signal.org, and on the Samsung app store. Meanwhile, the same threat actor also developed the FlyGram app, which was accessible through the same three methods. Google took it down from Play. Trojan has been connected to the GREF hacking gang Both applications were created using open source technology from Signal and Telegram. An intelligence gathering mechanism known as BadBazaar was incorporated into that code. The Trojan has been connected to the GREF hacking gang, which is associated with China. Uyghurs and other Turkic ethnic minorities have historically been targeted by BadBazaar. A Uyghur Telegram group also disseminated the FlyGram malware, further connecting it to prior BadBazaar malware family targets.
  • 2. If users connected their infected smartphone to their real Signal number, as is typical when someone initially instals Signal on their device, Signal Plus could monitor sent and received messages as well as contacts. When this happened, the malicious app sent the attacker a ton of personal data, including the device’s IMEI number, phone number, MAC address, operator information, location data, Wi-Fi information, emails for Google accounts, contact information, and, in the event that one had been set up by the user, a PIN used to send texts. Exclusively for specifically targeted people The creators of Signal have been alerted of this weakness by ESET Research. Threat actors can modify the code of any messaging app and advertise it in a fraudulent or misleading way, according to the encrypted messaging service. In this scenario, the fake Signal and Telegram client could easily block that code path to avoid the warning and hide if the official Signal clients were to show a notification everytime a new device is joined to the account. Downloading only authentic versions of such programs, only from official sources, is the best way to avoid falling prey to a fake Signal—or any other malicious messaging app. According to the information previously given by the malware to the C&C server, the server hasn’t returned to the device a URI for linking throughout our research, indicating this is likely enabled exclusively for specifically targeted people.