Remove Ads
[Image: banner.jpg]

Share on Facebook Share on Twitter

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
The Best Android Forums for Help and Discussion
#1
Attackers behind the campaign used several effective techniques to repeatedly bypass the vetting process Google uses in an attempt to keep malicious apps out of Play. One method was to initially submit a benign version of an app and add the backdoor only after the app was accepted. Another approach was to require few or even no permissions during installation and to later request them dynamically using code hidden inside an executable file. One of the recent apps posed as a browser cleaner.
Reply
#2
Compared to buying an iPhone, buying an Android phone can be a dizzying choice thanks to the huge array of different devices from different manufacturers. While there are mid-range and budget Android options, this list is our collection of the best Android phones overall, so they’re higher in price as they have the best current features like top cameras, displays and build quality.
Reply
#3
We’ve included all of the Android world’s big hitters like Samsung, Huawei, Google and OnePlus, as well as newer contenders like Xiaomi, with the OnePlus 8 Pro and Xiaomi Mi Note 10 being the latest additions. Plus we've just included the Samsung Galaxy S20 Ultra too. And more phones will likely be added soon. Sony recently unveiled its Xperia 1 II, which looks very strong. We’ll be reviewing it soon, along with the LG Velvet, which is expected to be announced in the coming few weeks.
Reply
#4
Attackers behind the campaign used several effective techniques to repeatedly bypass the vetting process Google uses in an attempt to keep malicious apps out of Play. One method was to initially submit a benign version of an app and add the backdoor only after the app was accepted. Another approach was to require few or even no permissions during installation and to later request them dynamically using code hidden inside an executable file. One of the recent apps posed as a browser cleaner.
Reply
#5
Within time, the apps provided a backdoor that collected data about the infected phone, including the hardware model, the Android version it ran, and the apps that were installed. Based on that information, the attackers could use the malicious apps to download and execute malicious payloads specific to a particular infected device. The payloads could collect locations, call logs, contacts, text messages, and other sensitive information.
Reply
#6
Google officials declined to say how or even if the company is working to prevent malicious apps from using the described techniques used to bypass the app-vetting process. Instead, the officials issued a statement that said: “We’re always working to improve our detection capabilities. We appreciate the work of the researchers in sharing their findings with us. We’ve since taken action against all the apps they identified.”
Reply
#7
Most of the apps contained functionality that require that phones be rooted. That would require apps to run on devices with known rooting vulnerabilities or for the attackers to exploit flaws that aren’t yet known to Google or the general public. Kaspersky Lab researchers didn’t find any local privilege escalation exploits in the apps themselves, but they haven’t ruled out the possibility such attacks were used. In an email, a researcher wrote:
Reply
#8
Much the same as mSpy, you can likewise utilize Spyzie to figure out how to hack somebody's Gmail. Since its iOS rendition doesn't bolster a keylogger directly, you can in any case use Spyzie to follow an Android. Interestingly, you don't have to attach your gadget to utilize its keylogger. Additionally, Spyzie is really simple to utilize, runs in an amazing covertness mode, and offers a few other gadget following highlights also. To figure out how to hack a Gmail secret key utilizing Spyzie, the accompanying advances can be taken.
track phone
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)