

Sensitive data exfiltration to steal cryptocurrency funds of the victims.Replace the cryptocurrency wallet addresses of the victim with the attacker’s ones.Track and monitor the chat messages of the victim.
#Key eset cyber security android#
The trojanized Android apps are primarily used for the following purposes:. They found all of them were linked to dozens of fake Telegram and WhatsApp websites that were being advertised on the channels. You can usually find links to copycat websites in the “About” section of the fake YouTube channels.Īpart from this, a multitude of fraudulent YouTube channels was discovered by security analysts during their analysis.

The occurrence of such a scenario is completely due to the ban on these two applications in China. It has been suspected that the operators behind these copycat applications mainly target Chinese-speaking users, as evidenced by their language usage in the copycat applications.
#Key eset cyber security for android#
From the affected devices, these apps also seek the saved screenshots, from which they identify the texts with the help of OCR, and for Android malware, this event is also observed for the first time.
