A sophisticated spyware campaign is getting the help of Internet service providers (ISPs) to trick users into downloading malicious apps. This corroborates earlier findings from security research group Lookout, which has linked the spyware to Italian spyware vendor RCS Labs.
Researchers believe hermit has already been deployed by the government of Kazakhstan and Italian authorities. Google has identified victims in both countries and says it will notify affected users.
Hermit is a modular threat that can download additional capabilities from a command and control server. This allows the spyware to access the call records, location, photos, and text messages on a victim’s device.
The spyware can infect both Android and iPhones by disguising itself as a legitimate source, typically taking on the form of a mobile carrier or messaging app. Bad actors would then pose as a victim’s mobile carrier over SMS and trick users into believing that a malicious app download will restore their Internet connectivity.
Developers were able to distribute infected apps on iOS by enrolling in Apple’s developer enterprise program. This allowed bad actors to bypass the app store’s standard vetting process and obtain a certificate that’satisfies all of the iOS code signing requirements on any iOS devices’.
Hey followers! Let's dive into a funny yet frustrating story about the BMW i4 electric…
Hey there, tech lovers! Today, let’s talk about an exciting development in India’s online grocery…
Hey folks, Nuked here! Let’s dive into some exciting news about tech investments and partnerships…
Hey everyone! Nuked here, bringing you some exciting tech news with a dash of humor.…
Hey there, tech enthusiasts! Nuked here, ready to serve some exciting news about how AI…
Hello followers! Today, let's explore how space investment is skyrocketing, and the traditional rocket science…