Connect with us
Trojans target the cryptocurrency of mobile users iPhone and Trojans target the cryptocurrency of mobile users iPhone and

Phones

Trojans target the cryptocurrency of mobile users – iPhone and Android users are at risk

Published

on

Doctor Web has warned about the spread of Trojans designed to steal cryptocurrencies from mobile device owners.

Trojans target the cryptocurrency of mobile users - iPhone and Android users are at risk

Malicious applications steal secret seed phrases that are needed to access crypto wallets. According to experts, users of both Android-based devices and Apple iOS-based smartphones are at risk.

Detected Trojan applications hide in hacker-modified versions of popular crypto wallets. Currently, experts have tracked cases of malicious code injection into copies of applications such as imToken, MetaMask, Bitpie and TokenPocket, but this list may be wider.

Known modifications of identified threats are identified by Dr.Web as Trojans from the Android.CoinSteal and IPhoneOS.CoinSteal families. Among them are Android.CoinSteal.7, Android.CoinSteal.8, Android.CoinSteal.10, IPhoneOS.CoinSteal.1, IPhoneOS.CoinSteal.2, IPhoneOS.CoinSteal.3 and others.

Trojan versions of crypto wallets are distributed through malicious sites that copy the appearance and functionality of the original web resources of the respective projects. The addresses of such sites are also as close as possible to the real ones.

Depending on the type of device from which the fake sites are visited, users are prompted to download and install the version of the wallet for the respective platform – Android or iOS. Trojan versions for Android are most often downloaded directly from a visited malicious resource. In this case, owners of iOS devices are usually redirected to another site designed in the style of the official Apple application catalog.

Even though both operating systems have third-party software installation disabled or disabled by default, it is still possible. So, on Android devices, it is enough to enable the necessary option in the system settings. And in the case of Apple devices, fraudsters use the installation mechanism through special configuration profiles (configuration profiles) and provisioning profiles (provisioning profiles). At the same time, it is not required for installation, a jailbreak was performed on the device.

Since Trojans are copies of real applications with minimal modifications, they work exactly like the originals, and it is almost impossible to distinguish them from each other by external signs.

Click to comment

Leave a Reply

Your email address will not be published.

Phones

“Born to accelerate the popularization of 5G.” Xiaomi introduced a cheap smartphone Redmi Note 11 SE with 90 Hz, 5000 mAh and 48 MP

Published

on

Born to accelerate the popularization of 5G Xiaomi introduced a

The head of Xiaomi, Lei Jun, officially announced the company’s most affordable smartphone with support for fifth-generation networks, which was called the Redmi Note 11 SE.

“Born to accelerate the popularization of 5G,” is how the company leader describes this device. The Redmi Note 11 SE is priced at just $150.

Born to accelerate the popularization of 5G Xiaomi introduced a

Redmi Note 11 SE received a 6.5-inch FullHD + display with support for a refresh rate of 90 Hz and a hole for the front camera in the central upper part of the screen. It is based on a MediTek Dimensity 700 single-chip system with a 5G modem.

The amount of flash memory is 128 GB, the battery capacity is 5000 mAh, the main image sensor has a resolution of 48 megapixels.

Continue Reading

Phones

Even more like the iPhone: Apple Watch Series 8 showed from all sides in high-quality images

Published

on

Even more like the iPhone Apple Watch Series 8 showed

Apple is expected to launch three smartwatch models this fall, including the Apple Watch Series 8, Apple Watch SE, and the first rugged watch. This post provides high-quality renderings of the Apple Watch Series 8 based on leaks and available information.

Even more like the iPhone: Apple Watch Series 8 showed from all sides in high-quality images

The biggest difference compared to the Apple Watch Series 7 is that the screen protector is completely flat. This makes the watch case look more like an iPhone case. You can also see that the screen frame has become even smaller. It is quite possible that the Apple Watch Series 8 will be the watch with the highest effective display area.

Enlarged slots for the speaker are visible on the left side of the case, the usual clock controls are located on the right side. The watch will be able to measure heart rate and blood oxygen saturation. As for measuring temperature, blood sugar and blood pressure, Apple is working on these features, but they are unlikely to appear this year.

Even more like the iPhone: Apple Watch Series 8 showed from all sides in high-quality images

Even more like the iPhone: Apple Watch Series 8 showed from all sides in high-quality images

According to rumors, the presentation of the Apple Watch Series 8 will take place in September this year.

Continue Reading

Phones

Source: iPhone 14 will get a front camera with autofocus

Published

on

Source iPhone 14 will get a front camera with autofocus

According to South Korean sources, one of the major improvements in the iPhone 14 line of smartphones, which is expected to be released in September, will be the front camera. Apple considers LG Innotek as a supplier of such high-end modules. In this case, for the first time, the supplier of the front cameras for the iPhone will be a Korean company, and not the unnamed Chinese manufacturers, as before. According to the source, Apple has reconsidered the attitude to the front cameras of its smartphones as inexpensive components, and now these will be more advanced solutions.

Source: iPhone 14 will get a front camera with autofocus

Initially, Apple planned to start installing LG Innotek modules only in the iPhone 15, but then moved the deadlines, so the iPhone 14 will already have a high-quality front camera this fall. It is reported that the new module will be three times more expensive than the previous model, but the owners of the next generation iPhone will be able to use autofocus for selfies. A number of other improvements are also expected, thanks to which the front camera of the new iPhones will come close to the main one in terms of its capabilities. According to rumors, LG Innotek has already begun preparations for mass production of front cameras for the iPhone 14.

Continue Reading

Phones

“Alien” and “Predator” hunt for Android-smartphones. Details about the new spyware

Published

on

Alien and Predator hunt for Android smartphones Details about the new

Android users have been targeted by a new spyware called Alien that can download malware or the Predator virus. The spyware was allegedly developed by Cytrox in North Macedonia.

Google claims that several exploits, which collectively fall under the Alien spyware category, were sold by Cytrox to various government-backed groups. CitizenLab, an online security research company, has also discovered several attacks, and Google claims they are all related to Alien spyware.

Google claims that zero-day exploits based on Alien spyware are used alongside some older exploits. It appears that malware developers are actively trying to take advantage of the time difference between when some critical bugs were fixed but not flagged as security issues and when those fixes were fully rolled out to the Android ecosystem.

Alien and Predator hunt for Android smartphones Details about the new

The virus spreads mainly through email. Victims receive email messages with suspicious links. Either link redirects victims to a website that installs malware.

The virus can potentially record audio, hide applications, and perform a number of other actions. Google claims to have sent out patches to fix the vulnerabilities. However, it is important that Android users remain cautious when opening emails from unfamiliar sources. Also, email users should never click on links embedded in emails without first verifying the identity of the sender.

Continue Reading

Most Popular