Another new malware, that is targeting Whatsapp, Facebook Messengers.That how target's your device.
Last time i have been informed you about a android malware called "Eventbot" Which is Mostly targeting Android devices to steal Banking information from android users. if it like this, 2nd malware discovered in two days called, "WolfRat" that attack Smartphones to steal Facebook, whatsapp, chat-messages, Call reacordings and more Sensitive data.
Securing your devices from hackers been quite difficult these days, hackers are finding new ways to attack our devices and steal data.
The researchers said
The Malware is pushed via phishing/smishing links to the target devices, Researchers found that the command-and-control (C2) server domain is located in Thailand.
The chat details, WhatsApp records, messengers and SMSs of the world carry some sensitive information and people choose to forget these when communications occur on their phone. We see WolfRAT specifically targeting a highly popular encrypted chat app in Asia, Line, which suggests that even a careful user with some awareness around end-to-end encryption chats would still be at the mercy of WolfRAT and it’s prying eyes.
How does WolfRAT affect Android Smartphones?
After phishing/smishing the malware on the targeted device, WolfRAT poses as legitimate services, such as Google Play apps or Flash updates, by using their icons and package names.
These are normally functional packages, with no user interaction needed. For instance, the malware uses a package name (“com.google.services”) to pretend to be a Google Play application.
The Malware once updates/flashes apps with its changes it enables a screen-recording feature. The screen recording is started when the RAT determines that WhatsApp is running.
So be careful while installing the new Application in your Smartphones. Do Not click on any suspicious links, Shared by someone. Do not install applications from third-party sites.
Securing your devices from hackers been quite difficult these days, hackers are finding new ways to attack our devices and steal data.
The Malware is pushed via phishing/smishing links to the target devices, Researchers found that the command-and-control (C2) server domain is located in Thailand.
The chat details, WhatsApp records, messengers and SMSs of the world carry some sensitive information and people choose to forget these when communications occur on their phone. We see WolfRAT specifically targeting a highly popular encrypted chat app in Asia, Line, which suggests that even a careful user with some awareness around end-to-end encryption chats would still be at the mercy of WolfRAT and it’s prying eyes.
After phishing/smishing the malware on the targeted device, WolfRAT poses as legitimate services, such as Google Play apps or Flash updates, by using their icons and package names.
These are normally functional packages, with no user interaction needed. For instance, the malware uses a package name (“com.google.services”) to pretend to be a Google Play application.
So be careful while installing the new Application in your Smartphones. Do Not click on any suspicious links, Shared by someone. Do not install applications from third-party sites.