Schema-Root.org logo

 

  cross-referenced news and research resources about

 spyware

Schema-Root.org logo
images:  google   yahoo YouTube
spacer

updated Fri. December 6, 2019

-
A malicious chat app that was advertised on Facebook and sold in the Google Play store was discovered to execute a previously undiscovered spyware program linked to APT-C-23, an advanced persistent threat group allegedly with ties to Hamas. Michael Flossman, head of threat intelligence at mobile ...
We have been detecting a new wave of network attacks since early March, which, for now, are targeting Japan, Korea, China, Taiwan, and Hong Kong. The attacks use Domain Name System (DNS) cache poisoning/DNS spoofing, possibly through infringement techniques such as brute-force or dictionary ...

This particular spyware, per the handy “TL;DR” section of the Reddit post, sounds pretty scary: “Arena silently shipped a spyware component as part of one of their updates on March 6th that submitted hashes of all processes running on your system to their servers, compromising your privacy, degrading ...
A new targeted surveillance app has been found and booted from Google Play. The app, named Dardesh, posed as a chat application and acted as a downloader for a second app that could spy on users. targeted surveillance spyware. The Dardesh app was spotted and analyzed by Lookout researchers, ...
Hackers might be increasingly turning their attention to cryptominers, but spyware remains the most popular form of malware among criminals targeting businesses, according to new research. Malwarebytes' analysis of its own data revealed that cryptomining and ransomware attacks rose by 27 and 28 per ...
OpenStack Queens was released yesterday. The 17th version of the open-source cloud infrastructure software "offers a packed release with advancements benefiting not only enterprises with mission-critical workloads but also organizations investing in emerging use cases like containers, NFV, edge ...

I'm pretty sure I was sent Pegasus, the spyware purchased by the Mexican government, and though I've wiped that phone and replaced it, I'm cautious. I use the typical encrypted apps for communications and maintain several phones, which I use for different purposes. It's annoying lugging all of them ...
A newly uncovered form of Android malware secretly steals sensitive data from infected devices - including full audio recordings of phone calls - and stores it in cloud storage accounts. An invasive form of spyware, RedDrop harvests information from the device, including live recordings of its surroundings, ...
The malware was first spotted by UK mobile security firm Wandera on the phones of employees of several global consultancy firms. Despite an impressive array of intrusive features that could easily classify it as spyware, the malware wasn't part of a cyber-espionage operation but was primarily used to ...
The the highest concentration of infections is in Israel, but victims have also been seen in the US, China, Germany and France. Uncovered by researchers at Avast, the operation has been dubbed 'Tempting Cedar Spyware'. The name combines the main means of attack - by tricking victims using fake social ...
The Mexican government declined to offer specific comments on the investigation but said it remains “in the phase of exhausting different lines of investigation.” It also said that it had been in constant contact with the group of forensic analysts that first discovered the existence of the spyware, the Citizen Lab ...
Stalkers are monitoring their victims' movements and conversations using bugging and tracking devices as well as spyware and covert phone apps easily bought online, victims' groups have warned. These devices and software allow stalkers to track their victims, listen to their phone calls, or turn on their ...
In an interview with Motherboard, the author of the Reddit thread linked above, Fabian Wosar, says that ArenaNet had installed spyware on players' computers in order to detect the software. Having reverse-engineered the game's updates, Wosar says that a patch to the game on March 6 included software ...
A hacking group which analysts believe is linked to Hamas successfully placed highly targeted surveillanceware in the Google Play Store in order to spy on Palestinian targets, according to new research from the mobile security firm Lookout. The newly identified malware, known as Desert Scorpion, was ...
The developer of the popular online role-playing game Guild Wars 2 banned almost 1,600 players accusing them of using cheating software—and it allegedly used spyware to identify the suspected cheaters. On Saturday, a spokesperson for ArenaNet, the company that develops Guild Wars 2, announced ...
According to Fabian Wosar, a security researcher and one of the Guild Wars 2 players banned, ArenaNet was able to spot the alleged cheaters thanks to what essentially amounts to spyware. In a Reddit post, Wosar explained that he reverse-engineered Guild Wars 2 updates over the last few weeks and ...
Analysis US judges have shut down an appeal from a convicted pedophile who claimed the FBI hacking of his computer was an illegal and unreasonable search. Gabriel Werdene, 53, of Bucks County, Philadelphia, is serving two years in a federal prison for rummaging through the Playpen dark-web filth ...

The campaign underlines the effectiveness of social engineering techniques and the importance of user awareness in blocking attempts by cyber criminals to install malware. Analysis of the spyware revealed that it had malicious modules in common with the Android package kits (APKs) used for the ...
Facebook is rolling out a new security feature called Protect to many users of its iOS app. While the name might make unknowing users feel good about installing the associated free app, the Facebook owned VPN is designed to collect and analyze user data to “improve Facebook products and services.” ...
In the face of those challenges, police departments around the country have increasingly turned to what some critics have dubbed cellphone spyware. It's a device with software that when attached to a cellphone can extract and store contacts, pictures, GPS locations and frequented social media sites ...
Stalkers have been able to use spyware to track their victims' locations. Photograph: StockFinland/Getty Images/iStockphoto. Stalkers are monitoring their victims' movements and conversations using bugging and tracking devices as well as spyware and covert phone apps easily bought online, victims' ...
Luminosity Link was designed to give cyber criminals access to victims' documents, photographs and other files, record all the keystrokes entered and even activate the webcam on the victim's computer. According to Europol, the spyware tool was supported by a network of individuals in 78 countries and ...
The spyware was initially identified in late December, but McAfee's Advanced Threat Research team now believes the four tools were placed there as part of a complex email-based phishing attack reported in January. The tools appear to be designed to collect information on South Korean organisations ...
People around the world are rushing to acquire all kinds of cryptocurrency, hoping that prices will go up and they will be rolling in money when they sell their investment stash. Criminals have, expectedly, noticed the rush and are doing their level best to cash in on it. The latest attack on ...
As law enforcement agencies look to increase their digital capabilities with tools such as spyware, a plethora of companies are trying to cash in. One of those, an India-based firm called Aglaya, recently offered an eyebrow-raising, if likely exaggerated, product: what it describes as the cyber equivalent to a ...
Spyware traced to a building belonging to Lebanese intelligence has managed to steal “hundreds of gigabytes” of data from thousands of people in more than 21 countries via numerous campaigns which started back in 2012. The types of stolen data included audio recordings, text messages, call records, ...
Dubai: Security experts in the UAE have warned WhatsApp and smartphone users to be extra vigilant, as there is a spy software going around that can secretly read chats, take selfies and record audio and video. Described as one of the “most advanced” and highly sophisticated malware that has already ...
Crucially, it appears someone is renting out the Dark Caracal spyware platform to nation-state snoops. "This is definitely one group using the same infrastructure," Eva Galperin, the EFF's director of cybersecurity, told The Register on Wednesday. "We think there's a third party selling this to governments.".
There's a string of spyware campaigns operating out of a government building in Lebanon, according to new research from Lookout Security and the Electronic Frontier Foundation. Dubbed “Dark Caracal,” the new group is linked to attacks on thousands of victims in more than 21 different countries, a range ...
The US Department of Justice has arrested and charged a 37-year-old California woman with hiring a hitman to murder her 55-year-old boyfriend. According to a criminal complaint obtained by Bleeping Computer, the events transpired in early December 2017.
Security experts have warned smartphone owners of a software that has the capability to read conversations, take images and record video and audio. Named Skygofree, it has been described as one of the most advanced forms of malware to ever exist. How does it reach users? The tool is spread through ...
McAfee has identified the spyware as Android/HiddenApp.BP. The researchers found that in the case of the malicious links to Blood Assistant, Facebook was used in 12% of cases to send the link to its targets. According to the researchers, the dropped Trojan uses popular cloud services Dropbox and ...
When Mashable reported about the spyware back in July, Synack chief security researcher Patrick Wardle said, "[A] hacker built this to spy on users for probably perverse reasons." It gets worse. According to the DOJ, Durachinsky allegedly watched and listened to people who were infected. He's also said ...
"It's difficult to go from married and trusting each other to 'You are the devil,' " divorce lawyer Sophya Raza says. "Always keep your privacy at some basic level, especially if you are having marital issues." We asked divorce lawyers what they tell clients when spyware comes up. Here's what they told us.
Software that hijacks your computer to mine has become the most popular malware on the planet. by Jamie Condliffe; January 19, 2018. 3. The practice of surreptitiously mining cryptocurrency on other people's hardware is becoming pervasive, overtaking ransomware as a tool of choice for extorting money online.
A 28-year-old man who allegedly hacked into thousands of computers to watch and listen to users has been indicted in Ohio. Federal prosecutors say Phillip Durachinsky created malware that enabled him to remotely access and turn on the cameras and microphones of computers. Durcachinsky was ...
The government of Ethiopia has "apparently" employed spyware purchased from an Israeli defence contractor to spy on independent journalists and dissidents living outside of the country, a recent report has revealed. Israel's CyberBit Solutions Ltd sold spyware to Ethiopia, which used the technology "to ...
In a report released Wednesday [6 December 2017] by Citizen Lab, it was found that Ethiopia has continued to use a form of spyware called PC Surveillance System to target various ISP addresses in over 20 countries, including that of the government of Eritrea. Some of the targets also include the Oromia ...
The cybergang behind the now defunct FinFisher man–in-the-middle attacks has switched over to using a new spyware dubbed StrongPity2 and is now using a several popular websites to conduct watering hole attacks to help install this malware. ESET researcher Tomas Kafka reported StongPity2, which ...
Continuing our research into FinFisher – the infamous spyware known also as FinSpy and sold to governments and their agencies worldwide – we noticed that the FinFisher malware in our previously-documented campaign, which had strong indicators of internet service provider (ISP) involvement, had ...
Citizen Lab questioned whether Israeli authorities property scrutinized Cyberbit's supply of the tool to Ethiopia, given the country's history of using spyware against activists. "The fact that a sale must have taken place in spite of this reality raises a number of concerns regarding Cyberbit's due diligence ...
Since 2016, the Ethiopian government has targeted dissidents and journalists in nearly two dozen countries with spyware provided by an Israeli software company, according to a new report from Citizen Lab, a research and development group at the University of Toronto. Once their computers are infected, ...
Researchers have uncovered a nefarious but comically incompetent spyware campaign that's targeting Ethiopian dissidents in the US, UK, and other countries. A report published Wednesday morning by the University of Toronto's Citizen Lab said the campaign, which has operated for at least 14 months, ...
Marczak is a researcher at Citizen Lab, a group that studies how governments around the world use new technologies such as spyware against dissidents and activists. For years, Marczak and his colleagues have exposed several hacking attacks against people all over the world. This time, however ...
In his complaint, Mr. Reetz-Laiolo, who is also a writer, claims that Ms. Cline plagiarized phrases and scene structures from him that appear in “The Girls,” and used spyware to read his email and other personal documents. Ms. Cline's publisher and Scott Rudin Productions, which optioned the screen rights ...
HP may have installed a spyware in its computers without the permission of users, with the program also coming with the added bonus of slowing down the performance of the affected machines. The spyware, however, is easy to detect and remove, so all owners of HP PCs and laptops are urged to delete ...
Indian Army has issued an advisory for its personnel asking them to delete TrueCaller from their phones immediately. The advisory issued on November 24 notes that TrueCaller is a "spyware" or a "malicious ware" and that it should be immediately deleted from the personal and official phones. The advisor ...
If you're the owner of an HP computer, then you need to be aware of what's going on. The company has apparently installed spyware on user computers without their knowledge, and guess what? This driver is slowing down their machines. The spyware in question is a telemetry client, and it's called HP ...
Cline's countersuit acknowledges that she used the spyware to look into Reetz-Laiolo's alleged infidelity during their relationship, but says she had no access to the software once she sold the computer. The suit says it is baseless to suggest she used the software to plumb his writings for her own.
HP has been accused of stealthily installing a piece of software on its users' PCs which hoovers up data on that machine, effectively acting as spyware, and it seems it is slowing systems down considerably, as well. This worrying development was reported by Computerworld, and the software in question is ...


resources


 

news and opinion


 


 


 


 


schema-root.org

   internet
    security
      spyware
        keyloggers

internet security:
      darkware
      exploits
      hacker
      malware
      spyware
      trojans
      virus

cross-references for
spyware: