Category Archives: Android

The Android operating system is simple, lightweight but very easy to hack. We write news articles, various facts about the flaws of this OS.

Android: The Joker is back on the Google PlayStore

Recently security teams discovered on the online app store of Google Play Store, the presence of one of the most dangerous malware that threatens Android users.

This malware is nothing but the famous Joker, a program used by hackers to empty victims' bank accounts by subscribe to illegal and very expensive subscriptions without their knowledge.

This article will also interest you: Google's Play Store to test 24,000 unreliable apps

In a sense the Joker is considered to be one of the most popular malwares of cybercrime. It makes its first appearance in 2019. Its main feature is to subscribe users to paid services and this, without their knowledge. During the year 2020, he would have been seen several times on the play store. Before being eliminated by Google's security services. Unfortunately this is only for now as it reappears in April of this year. It was first seen in AppGallery, the app store of Chinese giant Huawei. Yesterday, security researchers from the American company McAfee discovered Google's app store. The software would be incorporated into more than 8 applications. These apps are still available on the Google Play store.

Looking closely at these applications alone, there are more than 700,000 downloads. Which is not insignificant in itself. The same modus operandi as the Joker was clearly observed two years ago. The operators behind this malicious program can not only hijack SMS messages, but also use them to make purchases that are not authorized by the user himself. The McAfee researcher claims to have been able to break into the hacker server behind these 8 applications. As a result, they were able to discover a fairly large number of the personal trainings belonging to the victims. Information includes phone numbers, personal text messages, IP addresses or geographic location. On the operator's server, there were also automatic renewal subscriptions. "The malware hijacks the Lister Notification to steal incoming SMS messages as the Android Joker malware does, without the SMS's permission to read," the researchers explained.

According to the information we have, Google has already removed C8 application from its catalog. "It's important to pay attention to apps that ask for SMS and notification permissions. Simply put, legitimate photo editing and wallpaper applications do not require these permissions because they are not necessary to operate them. If a request seems suspicious to you, don't allow it," says McAfee researchers.

We'll give you a complete list of the applications affected by this security issue:

– Studio Keypaper 2021;

PiP Editor Camera;

– My Favorites up Keypaper;

Super Color Hairdryer;

– Pip Hit Camera;

– Daynight Keyboard Wallpaper;

– Super Star Ringtones;

– Photo Editor app;

Now access an unlimited number of passwords:

Check out our hacking software

A malicious program hide behind a fake Android system update

Since last week, computer security specialists have discovered a traffic malware whose spread is quite special.

Indeed this malware takes the form of a system update. It attacks Android devices and can cause serious damage when it hits smartphones. In particular, it is against the possibility for the hacker to take remote control of the terminal. There is also the ability to steal personal information from users running Android.

This article will also interest you: Android: 37 vulnerabilities fixed by Google

The malware in question was discovered by computer security researchers at Zimperium. Like the other one who attacked Google's system, Twitter and Facebook, they are among those malwares that have frightened users over the past week.

According to the descriptions made by the specialists they discovered, this malware camouflages itself behind an application that takes the name "System Update" or "System Update" in English. This program can only be installed through an external APK file. Indeed it is not available on the Google PlayStore. From the moment it is installed on the smartphones of its victims, it automatically takes control of them to then steal their data. In addition, this spy program offers its operator the opportunity to access contacts, messages, browser favorites, search history… In short the total. It can also record calls and make audio recordings, taking photos, all the time depending on the location of users of corrupted smartphones.

"This is by far the most sophisticated malware we've seen to date. I think it took a lot of time and effort to create this application. There are certainly others of this type and we are doing our best to detect them as quickly as possible. explains Zimperium's CEO. According to the latter, this malware would be part of a targeted cyberattack campaign.

The hackers behind this spyware have not yet been identified. While there is a companion of targeted computer attacks in progress, the targeted victims have not yet been identified. "We are starting to see an increasing number of RATs (Remote Access Trojans) on mobile devices. And their level of sophistication tends to increase. It seems that the hackers have realized that this type of device contains a wealth of information. Much less protected than traditional terminals, they are therefore easier to hack," said the first Zimperium official.

It should be noted that the Android system has been under severe strain for some time. Indeed, the end of March is very challenging for users of the systems when they have to deal with Bugs and malware that keeps being discovered more and more.

Now access an unlimited number of passwords:

Check out our hacking software

Malware: The "Alien" program capable of stealing passwords on nearly 226 apps on the PlayStore

Once again the Android system see the birth and development within it a new malware intended to attack users. It's named after Alien.

According to computer security experts, it would be able to steal passwords on nearly 226 popular Android apps. Apps all available on the PlayStore. Army of more famous Facebook, Snapchat, WhatsApp Twitter, Amazon, Instagram and even Coinbase. Several banking applications are even affected by the malware.

This article will also interest you: Computer security: 25 apps removed from PlayStore by Google

Alien was discovered by ThreatFabric's computer security specialists. Note an Alien and a Trojan horse. Simply limited to Android, it has been specially designed to steal the identifiers of the targeted people. Experts claim that its code was based on that of Cerberus, another dangerous malware that is known to the industry for stealing financial data.

In addition, Alien would also be able to steal certain personal information such as the contents of your SMS. And not just that. The program it just can allow you to send SMS messages without your knowledge, collect your contacts, check your location and even install other malicious applications without forgetting the possibility of recovering the authentication code received by SMS or email. This makes it easy for hackers to access your accounts when they decide. As for its spread, the program was allegedly leaked via a phishing site. That's why ThreatFabric warns: "A lot of it seems to be distributed through phishing sites, such as a malicious page that encourages victims to download fake software updates or Fake Corona applications," explains Gaétan van Diemen, a computer security researcher at the firm.

And unfortunately several hundred applications, are targeted by this malware. Among them, many banking applications. The availability of alien-targeted applications on Google's PlayStore and a real problem. Some French banks such as Boursorama ING Savings Bank or mutual credit are among Alien's targets. It is then assumed that the preferred target of hackers who designed this malware would in some way be banking applications to strip their victims. However, the collection of passwords and other identifiers may have some value in the Darkweb market. For example, bank identifiers are worth around $100 in bitcoin.

ThreatFabric gives us a list of applications targeted by Alien:

  • Cornerbase
  • Blockchain Wallet. Bitcoin, Bitcoin Cash,
  • Ethereum
  • BBVA Spain
  • Bankinter Móvil
  • Santander
  • UnicajaMovil
  • Bankia
  • EVO Banco Mevil
  • Kutxabank
  • rural
  • Akbank
  • Guaranteed BBVA Mobile
  • QNB Finansbank Mobile Banking
  • Connect for Hotmail – Outlook: Mail and
  • Calendar
  • CEPTETEB
  • Yap-Kredi Mobile
  • Enpara.com Cep 'ubesi'
  • Halkbank Mobil
  • Kuveyt Turk
  • Ziraat Mobile
  • İşCep – Mobile Banking
  • Vak-fBank Mobil Bankacilok
  • Ibercaja
  • ABN AMRO Mobiel Bankieren
  • IKO
  • mBank PL
  • Interbank APP
  • Rakuten Bank
  • freedomplus
  • Banca MPS
  • Gmail
  • mail.com mail
  • BNL
  • ING Italia
  • Yahoo Mail
  • norisbank App
  • La Mia Banca
  • HVB Mobile Banking
  • Commerzbank Banking – The app at your side
  • VR Banking Classic
  • Postbank Finanzassistent
  • TARGOBANK Mobile Banking
  • comdirect mobile App
  • DKB-Banking
  • Sparkasse Ihre mobile Subsidiary
  • Consorsbank
  • CA24 Mobile
  • Boursorama
  • The Savings Bank
  • Credit Mutuel
  • ING Direct
  • My Accounts – LCL
  • People's Bank
  • agricultural credit
  • The Societe Generale App
  • NAB Mobile Banking
  • CIBC Mobile Banking®
  • Halifax: the banking app that gives you extra
  • St.George Mobile Banking
  • mywireless
  • Chase Mobile
  • Fifth Third Mobile Banking
  • iMobile by ICICI Bank
  • Mobile Banking UniCredit
  • Scrigno App
  • Microsoft Outlook
  • Bank of America Mobile Banking
  • Capital One® Mobile
  • SunTrust Mobile App
  • USAA Mobile
  • U.S. Bank – Inspired by customers
  • Wells Fargo Mobile
  • BMO Mobile Banking
  • UBI Banca
  • RBC Mobile
  • Intesa Sanpaolo Mobile
  • ING Mobil
  • Odeabank
  • Postepay
  • 'EKER MOB', 'UBE'
  • CommBank
  • Google Play
  • Banca Digital Liberbank
  • ING Spain. Banca Móvil
  • Cajasur
  • Banca Mavi Laboral Kutxa
  • Mi Banco db
  • Banco Sabadell App. Your mobile bank
  • BBVA Net Cash | ES – PT
  • Santander Empresas
  • Paypal
  • Santander Mobile
  • Banco Caixa Geral Spain
  • Pekao24Makler
  • PekaoBiznes24
  • Facebook
  • imaginBank – Your mobile bank
  • WhatsApp
  • Snapchat
  • Twitter
  • Telegram
  • Instagram
  • Viber Messenger – Messages, Group Chats – Calls
  • CaixaBank
  • PeoPay
  • eBay
  • Amazon
  • Getin Mobile
  • BCP Banking App
  • Citi Handlowy
  • ABANCA- Banca Móvil
  • NETELLER – fast, secure and global money transfers
  • Simplii Financial
  • TD Canada
  • ČSOB Smartbanking
  • Bitcoin Wallet – Airbitz
  • ePayments: wallet – bank card
  • N26 — The Mobile Bank
  • ING Australia Banking
  • Payoneer – Global Payments Platform for Businesses
  • CIMB Clicks Malaysia
  • plusbank24
  • Skrill – Fast, secure online payments
  • Mycelium Bitcoin Wallet
  • Santander UK
  • OTP SmartBank
  • K MORE
  • KMA
  • SCB EASY
  • Netflix
  • Bendigo Bank
  • My Citibank
  • hongleongconnect
  • Bank of Melbourne Mobile Banking
  • Volksbank hausbanking
  • My BNP Paribas Accounts
  • Credit North for Mobile
  • BusinessPro Lite
  • BPI APP
  • NB smart app
  • Santander Particulares
  • BOQ Mobile
  • The Post Office – Postal Services
  • Cic
  • Fortuneo, my bank accounts – online stock exchange
  • ASB Mobile Banking
  • iBiznes24 mobile
  • Corp App
  • ScotiaMevil
  • credemmobile
  • Carige Mobile
  • Mobilni Banka
  • netbk Japan
  • CUA Mobile Banking
  • raiffeisenbank
  • Bank Austria MobileBanking
  • Barclays
  • BOCHK
  • HSBC Mobile Banking
  • ANZ Australia
  • Bankia Wallet
  • Bank Australia app
  • Beyond Bank Australia
  • Greater
  • Sabadell Wallet
  • Santander Wallet
  • The Postal Bank
  • cajamar
  • bcpbankingapp
  • ANZ Shield
  • Fibabanka Corporate Mobile
  • Mobile myAlpha
  • mbanking
  • eurobankefg
  • Popular
  • Krungthai NEXT
  • BBVA Wallet Spain. Mobile Payment
  • BBVA México (Bancomer Màvil)
  • Santander Argentina
  • Mercado Libre: compra fecil y ràpido
  • Santander Money Plan
  • Dhanlaxmi Bank Mobile Banking
  • centralbank
  • mahabank
  • Kotak – 811 Mobile Banking
  • sbanywherecorporate
  • HDFC Bank MobileBanking
  • SambaMobile
  • Scotiabank Colpatria
  • Bancolombia App Personas
  • Westpac Mobile Banking
  • suncorpbank
  • THE P-N BANKING APP
  • ING Bankieren
  • Enpara.com Cep 'ubesi'
  • Google Play Games
  • TBC Bank
  • ActivoBank
  • TSB Bank Mobile Banking
  • Royal Bank of Scotland Mobile Banking
  • NatWest Mobile Banking
  • U.S. Barclays
  • Skype
  • Bitcoin Wallet by SpectroCoin
  • Emirates NBD
  • Alawwal Mobile
  • Citi Mobile®
  • TD Bank (US)
  • Union Bank Mobile Banking
  • ING Business
  • SpardaSecureApp
  • Bankwest
  • HSBCnet Mobile
  • permanent tsb
  • Bank of Melbourne Business App
  • BankSA Business App
  • St.George Business App
  • Westpac Corporate Mobile
  • National Bank of Canada
  • Servus Mobile Banking
  • Luno: Buy Bitcoin, Ethereum and Cryptocurrency

For now, US giant Google has not yet deployed a security patch to protect applications in its malware store. However, users are advised to avoid applications from unofficial websites. To pay close attention to the link coming from unknown correspondence, is that visiting all the suspicious websites.

Now access an unlimited number of passwords:

Check out our hacking software

The problem of Fleeceware applications and their consequences in everyday life

Recently, computer security experts conducted a study on the impact of surveillance applications commonly referred to as Fleeceware.

The result is clear, these applications can cost victims enormously and financially.

This article will also interest you: Computer security: 25 apps removed from PlayStore by Google

It's not uncommon for these kinds of applications to make headlines. However the people most affected, users, by this kind of software are usually misinformed or not at all about the problem. It is with this in mind that studies are regularly conducted by cybersecurity experts. This is more the case for cybersecurity firm Sophos and its experts.

It is the specialists of the cybersecurity company Sophos have recently published the result of their studies that there is still the Google PlayStore, many more applications whose usefulness for these publishers is to deceive users, and this at the expense even of the policies and rules imposed by Google in its official store. According to experts, there are still 23 other applications that have been discovered.

It is known that during the month of June, the American giant had updated its rules and development policies regarding the new guidelines in order to be able to remedy certain shortcomings. Despite this, Sophos' IT security specialists have noted that many applications continue to deviate from these new rules. That's why they encouraged users to get rid of their smartphones as soon as possible.

"The new rules published by Google are designed to remedy some forms of misleading advertising, but they also have loopholes that allow for other behaviors that some might consider unscrupulous," said security researcher Jagadeesh Chandraiah in a blog post on the issue.

According to this expert's explanation, some software publishers tend to use a technique called "blind subscription," which is mostly careful to explain the app's user billing details. And this usually applies to spam subscriptions, which, as the Sophos specialist explains, acts as a "rabbit hole". More simply, once users sign up, they automatically subscribe to several other applications without even being aware. This means that these latter spend thousands of euros in "Fleeceware" applications, without him noticing for a long time, which are often linked to each other.

Google describes the practice by meaning that these kinds of offers tend to rely on free trials, users that they will automatically be billed at the end of the trial "Publishers are no longer allowed to do so, but some are still trying," Chandraiah explained.

For the 23 applications discovered by the cybersecurity company's problem researchers, here's the list:

com.photoconverter.fileconverter.jpegconverter

com.recoverydeleted.recoveryphoto.photobackup

com.screenrecorder.gamerecorder.screenrecording

com.photogridmixer.instagrid

com.compressvideo.videoextractor

com.smartsearch.imagessearchcom.emmcs.wallpapper

com.wallpaper.work.application

com.gametris.wallpaper.app

com.tell.shortvideocom.csxykk.fontmoji

com.video.magiciancom.el2020xstar.xstar

com.dev.palmistryastrology

com.dev.furturescopecom.fortunemirror

com.itools.prankcallfreelitecom.isocial.fakechatc

om.old.mecom.myreplica.celebritylikeme.pro

com.nineteen.pokeradar

com.pokemongo.ivgocalculator

com.hy.gscanner

Now access an unlimited number of passwords:

Check out our hacking software

The wallpaper image that makes Android bugger

There is an image, which is capable of crashing your smartphone running Android, simply if you place it in the background.

This unusual phenomenon has been the talk of the town since the beginning of the week. This phenomenon is part of a series of flaws that are being discovered more and more, which causes as much frustration as real dangers. Because once caught in the trap of this image, the user is forced to see his smartphone restart in a loop, until he resets it.

This article will also interest you: The smartphone impossible to hack

We remember that on the iPhone, simple emojis could crash the phone or even sending a simple message via Apple's messaging app, was likely to open a passage to the data stored on the phone's memory. In our case, for Google's operating system, Android, this time, we will have to deal with a simple image in the background. Despite the complexity of information systems, such simple but surprising problems continue to appear.

The problematic image here was discovered by IceUniverse, a news site specializing in news related to the Korean giant Samsung. "Never define this image as a wallpaper, especially for Samsung mobile phone users! This will crash your phone! Don't try! If someone sends you this photo, please ignore it." He could read on his Twitter account.

He warned the entire Android community via this tweet not to use the image in question. This is because of its ability to circumstantially render the smartphone unusable once it is in the background. And worse. The phone doesn't just crash, it starts to restart in a loop, all by itself. The user will have no choice but to completely reset the user to be able to use it again.

Moreover, after some tests conducted on different smartphones, it has been shown that not all mobile phones on Android are affected by this bug. According to the Android Authority website, the Huawei mate 20 pro, withstood the bug while the Google pixel 2 was indeed planted on the side of the specialized site 9To5Google.

Size accuracy: the image in question only crashes the mobile phone when it is programmed in the background. This implies that when it is in the gallery, transmitted or opened by other applications, it poses no problem on the operation of the smartphone.

The cause of this bug has been identified by the website 9To5Google. According to the latter, the problem is due to the way Google's operating system manages color spaces. Indeed, according to its basic configuration, Android is set up to display the images in the background using the RGB color space. This is not the case for this image that uses the RGB space. The consequence and therefore obvious, the operating system has difficulty displaying correctly in the image, which causes the various restart the screen. This explains why some phone brands are immune to this problem. Because according to this color management, the different smartphones running on Android may or may not crash. A problem that will surely be easy to fix via an update. Especially with Android 11, the flaw will be well solved. Because one is made the pixel 4XL android 11 has not suffered the problem common to all others running Android 10.

Now access an unlimited number of passwords:

Check out our hacking software