Tuesday, February 7, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
Ransomware Report
  • MagazineLatest Issue
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacks
    • Ransomware
    • Vulnerabilities
    World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

    World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

    RansomHouse

    RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

    OpenSSH Server

    OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    Dell Vulnerability

    Dell Releases New Updates For Tackling CVE-2023-23698 Vulnerability

    Mirai to Medusa Botnet

    Mirai to Medusa Botnet, Hackers Up Their Game to Launch Cyberattacks

    Sharp Data Breach

    Sharp Healthcare Data Breach Puts 62,777 Patients Information At Risk

    Microsoft Exchange Server

    Have You Patched This Microsoft Vulnerability Yet?

    Oh No! Demon Slayer Season 3

    Oh No! Demon Slayer Season 3, Episode 1 Leaked

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    Zero Trust Strategy

    US Department of Defense to Embrace Zero Trust Strategy

    browser hijackers

    Researchers Find Browser Hijackers on Google Chrome Web Store

    DORA proposal

    DORA Proposal for Cybersecurity Awaits Full Approval by Council and ESAs

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Call and Contact Center Expo

    The Countdown Begins: The Call and Contact Center Expo Las Vegas 2023 is Officially Here!

    Kemba Walden

    Kemba Walden: The Next ONCD Top Boss?

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    World CyberCon

    The Cyber Express to Host the World CyberCon India Edition on November 18, 2022

    World CyberCon India Edition 2022

    World CyberCon India Edition 2022

    GITEX GLOBAL 2022

    GITEX GLOBAL 2022 Helps Break The Glass Ceiling For Women Entrepreneurs

    Cybersecurity in 2023, Value Point Systems

    Softline Acquires Indian Cybersecurity Firm Value Point Systems

    KnowBe4 Vista Equity Partners

    KnowBe4 Goes Private With a $4.6 Billion Deal With Vista Equity Partners

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • Webinars
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
  • MagazineLatest Issue
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacks
    • Ransomware
    • Vulnerabilities
    World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

    World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

    RansomHouse

    RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

    OpenSSH Server

    OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    Dell Vulnerability

    Dell Releases New Updates For Tackling CVE-2023-23698 Vulnerability

    Mirai to Medusa Botnet

    Mirai to Medusa Botnet, Hackers Up Their Game to Launch Cyberattacks

    Sharp Data Breach

    Sharp Healthcare Data Breach Puts 62,777 Patients Information At Risk

    Microsoft Exchange Server

    Have You Patched This Microsoft Vulnerability Yet?

    Oh No! Demon Slayer Season 3

    Oh No! Demon Slayer Season 3, Episode 1 Leaked

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    Zero Trust Strategy

    US Department of Defense to Embrace Zero Trust Strategy

    browser hijackers

    Researchers Find Browser Hijackers on Google Chrome Web Store

    DORA proposal

    DORA Proposal for Cybersecurity Awaits Full Approval by Council and ESAs

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Call and Contact Center Expo

    The Countdown Begins: The Call and Contact Center Expo Las Vegas 2023 is Officially Here!

    Kemba Walden

    Kemba Walden: The Next ONCD Top Boss?

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    World CyberCon

    The Cyber Express to Host the World CyberCon India Edition on November 18, 2022

    World CyberCon India Edition 2022

    World CyberCon India Edition 2022

    GITEX GLOBAL 2022

    GITEX GLOBAL 2022 Helps Break The Glass Ceiling For Women Entrepreneurs

    Cybersecurity in 2023, Value Point Systems

    Softline Acquires Indian Cybersecurity Firm Value Point Systems

    KnowBe4 Vista Equity Partners

    KnowBe4 Goes Private With a $4.6 Billion Deal With Vista Equity Partners

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • Webinars
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

Hackers Use Counterfeit Android Devices to Launch Trojan on WhatsApp

Editorial by Editorial
August 24, 2022
in Firewall Daily, Data Breach News
5
Hackers Use Counterfeit Android Devices to Launch Trojan on WhatsApp
587
SHARES
3.3k
VIEWS
Share on LinkedInShare on Twitter
Listen to this story

Cybercriminals are using counterfeit android phones to hack into WhatsApp. Anti-malware company Doctor Web identified counterfeit versions of famous smartphone brands hosting trojans to attack WhatsApp and WhatsApp Business.

At least four android devices — P48pro, Radmi note 8, Note30u and Mate40 – were affected. According to the report, cybercriminals used these devices to launch a backdoor to spy to hack WhatsApp files and access its content. Moreover, the researchers also found that the counterfeit models ran on an outdated version of their software.

You might also like

RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

International Safer Internet Day: How Safe Are Our Teenagers Online?

How are counterfeit Android devices being hacked?

To hack WhatsApp and WhatsApp Business messaging applications, hackers create a backdoor that allows them to blend into the program and appear as a part of the application. This makes them less suspicious when they launch another backdoor to gain unauthorized access and pass through the security measures of WhatsApp.

Trojans launched to hack WhatsApp

As per the report, Trojans are sent into WhatsApp by targeting code execution. Cybercriminals use the modified object /system/lib/libcutils.so to launch a trojan that gives them complete access to the device. It can delete files, steal confidential data, and send messages to a remote server.

Android.BackDoor.3105 trojan

Hackers modify the inbuilt system library to Android.BackDoor.3105 that can launch a malicious library when a program in the device uses it. Android.BackDoor.3105 is a trojan application that is used on outdated Android devices.

Creating backdoors when the default system library is used

Hackers can determine how the malicious library exploits the device based on how the inbuilt system. This means that while the inbuilt system library is being used, the malicious library can create other backdoors to access more files in the device or even change system settings. This trojan downloads and installs additional malicious files when the inbuilt system /system/lib/libcutils.so and /system/lib/libmtd.so are used.

Command and Control Server sends modules

Android.BackDoor.3105 connects with a Command-and-Control Server (C&C) and seeks more module downloads that can be sent into the Android program. This communication also involves sending an array of the device’s data, making it easy to perform malicious downloads. This leads to adding more plugins to the victim’s counterfeit android device. The trojans download these plugins in the counterfeit android device that get decrypted and run to continue the damage further. Cybercriminals and attackers use command and Control servers to send trojans and malware into other devices.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: counterfeit androidcounterfeit android smartphonescyber expresscyber express newsfake device trojanWhatsApp Business messaging appWhatsApp trojan
Previous Post

Researchers Find 80000 Exploitable Hikvision Cameras

Next Post

Peiter ‘Mudge’ Zatko Exposes Twitter’s Negligence of Data Privacy

Editorial

Editorial

The Cyber Express is a publication that aims to provide the latest news and analysis about the information security industry. The news comes from a variety of sources and is updated regularly so that readers can stay up to date with the latest happenings in this rapidly growing field.

Related Posts

RansomHouse
Data Breach News

RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

by Vishwa Pandagle
February 7, 2023
OpenSSH Server
Firewall Daily

OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

by Editorial
February 7, 2023
Safer Internet
Firewall Daily

International Safer Internet Day: How Safe Are Our Teenagers Online?

by Vishwa Pandagle
February 7, 2023
Dell Vulnerability
Firewall Daily

Dell Releases New Updates For Tackling CVE-2023-23698 Vulnerability

by Ashish Khaitan
February 7, 2023
Mirai to Medusa Botnet
DDoS Attacks

Mirai to Medusa Botnet, Hackers Up Their Game to Launch Cyberattacks

by Vishwa Pandagle
February 7, 2023
Next Post
Peiter Mudge Zatko Twitter

Peiter 'Mudge' Zatko Exposes Twitter’s Negligence of Data Privacy

Comments 5

  1. Pingback: New Ransomware HavanaCrypt Disguises itself as Google Update
  2. Pingback: LastPass Breached: Over 25 Million Users May Have Been Affected
  3. Pingback: Cybercriminals Modify Older RATs to Evade Detection
  4. Pingback: Operation Dream Job Continues, Uses Trojanized PuTTY SSH Client
  5. Pingback: Self-Spreading Malware Redline Trojan Stealer Targets Gamers

Latest Issue is Out. Subscribe Now

Ai in Cybersecurity - Cybersecurity Magazine by The Cyber Express

Download Now



Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Recommended

Bargain

What Happens When You Bargain Wrong With Ransomware Gang?

December 30, 2022
Salary calculating Excel File

Fake Salary Calculating Excel File Target Ukrainian and Russian Military Personnel

October 13, 2022

Categories

Don't miss it

World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum
Cybersecurity News

World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

February 7, 2023
RansomHouse
Data Breach News

RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

February 7, 2023
OpenSSH Server
Firewall Daily

OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

February 7, 2023
Safer Internet
Firewall Daily

International Safer Internet Day: How Safe Are Our Teenagers Online?

February 7, 2023
Dell Vulnerability
Firewall Daily

Dell Releases New Updates For Tackling CVE-2023-23698 Vulnerability

February 7, 2023
Mirai to Medusa Botnet
DDoS Attacks

Mirai to Medusa Botnet, Hackers Up Their Game to Launch Cyberattacks

February 7, 2023

About

The Cyber Express

Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing, PR & media partnerships: [email protected]

For media kit and digitals sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cybersecurity Magazine
  • Events
    • World CyberCon Middle East 2023
    • Webinars

© 2022 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.