GearriceGearrice
  • Tech World
  • Smart Home
  • Mobile Zone
  • 5G
  • Alexa
  • Amazon
  • AMD
  • Android
  • Apple
  • AirPods
  • AirTag
  • Apple Studio
  • Apple TV
  • Apple Watch
  • HomePod
  • iOS
  • iOS 15.4
  • iPad
  • iPhone
  • Mac
  • iMac
  • MacBook
  • Apps
  • Asus
  • Bitcoin
  • Cars
  • ChatGPT
  • Computer
  • Keyboard
  • Contact us
  • Disney
  • Display
  • Electric
  • Elon Musk
  • Gaming
  • Google
  • Chromecast
  • Google Maps
  • HBO
  • How to
  • Huawei
  • HONOR
  • Instagram
  • Intel
  • Internet
  • iQOO
  • Laptop
  • Lenovo
  • LG
  • Meta
  • Facebook
  • Galaxy
  • Metaverse
  • Microsoft
  • Windows
  • Motorola
  • Movies
  • Movistar
  • MWC Barcelona 2022
  • Netflix
  • News
  • Nintendo
  • Nokia
  • Nvidia
  • OPPO
  • OnePlus
  • Realme
  • Orange
  • Oscars
  • Philips
  • PlayStation
  • Pokémon
  • Qualcomm
  • Snapdragon
  • Samsung
  • Solar
  • Sony
  • SpaceX
  • Spotify
  • Tablet
  • Tesla
  • TikTok
  • Tips and Tricks
  • Today
  • Twitch
  • Twitter
  • Vivo
  • VPN
  • WhatsApp
  • Write For Us
  • MIUI
  • POCO
  • Redmi
  • Mouse
  • OLED
  • Prime
  • Scooter
  • Xbox
  • Xiaomi
  • YouTube
Facebook Twitter Instagram
Facebook Twitter Instagram Pinterest
Gearrice Gearrice
Subscribe
  • Tech World
  • Best Deals
  • Gaming
  • Mobile Zone
    • Android
    • Apple
  • Smart Home
GearriceGearrice
Home»Tech World»YouTube clones can spy on you with your Android smartphone’s microphone

YouTube clones can spy on you with your Android smartphone’s microphone

By Daniel Casil19/09/20233 Mins Read
YouTube clones can spy on you with your Android smartphone’s microphone
Share
Facebook Twitter LinkedIn Pinterest

Copies of YouTube on Android are spreading across the Internet. These fraudulent versions, deployed by Pakistani hackers, are capable of taking control of a smartphone remotely. Once this is done, hackers can record audio files, take photos or take screenshots without your knowledge…

Computer security researchers at SentinelLabs discovered three fake YouTube apps on the Web. Offered via APK, these Android apps follow the YouTube interface to the letter. They impersonate the Google platform by appropriating the logo and most of the functionalities. However, these fraudulent versions have fewer features than the official YouTube. Good news, they have not invaded the Play Store.

In the application code, the researchers discovered CapraRAT. This is “RAT” (Remote Access Trojan) type malware, designed solely to take remote control of a computer system. In this case, the malware targets the Android operating system.

Also read: This fake Signal app distributed on the Play Store spied on discussions

Contents hide
1 A greedy and versatile spy malware
2 A campaign signed APT36

A greedy and versatile spy malware

Once installed on the phone of its victims, CapraRAT will be able to seizea host of sensitive data and take control of a large part of the device’s functions. In particular, the virus will be able to listen to your conversations using the microphone, take photos with the front or back camera, vacuum up all messages, and take screenshots. All files are then transferred to remote servers. Without the user’s knowledge, the malware can also send text messages, make phone calls or modify files in the system. With all these accesses, the virus can steal a mountain of data, such as banking details, passwords, intimate photos or even private keys linked to a digital wallet. In short, the damage is considerable.

To achieve its goals, the malware obviously starts by request multiple authorizations to the Internet user. Unsuspecting of a popular service like YouTube, the user risks complying without asking any questions. We always recommend that you think carefully before granting access, particularly to the microphone, to an application found on the web.

A campaign signed APT36

After investigation, SentinelLabs experts estimated that the operation was orchestrated by APT36, a hacker gang also known as the Transparent Tribe. Close to the Pakistani government, the gang generally targets government and military entities, primarily in India, with the aim of extracting sensitive information as discreetly as possible. It also targets human rights activists in Pakistan, with the tacit and to date unproven support of the authorities.

This is not the first time the gang has deployed CapraRAT through fake apps. Earlier this year, spy malware code was spotted inside fake dating apps, says a report from Eset. The APKs were offered on fraudulent websites, promoted on social networks, or through private messages. To fool the victims, the pirates did not hesitate to play the seduction card.

Source :

SentinelOne

Related Posts

Google explodes the prices of its smartphones

a patch that promises to solve the overheating problems of the new iPhone 15

You can now download iOS 17.0.3 to get rid of it

Add A Comment

Leave A Reply Cancel Reply

Tech World

The importance of web design for a business

By gearrice04/10/20230

Google explodes the prices of its smartphones

05/10/2023

a patch that promises to solve the overheating problems of the new iPhone 15

05/10/2023

You can now download iOS 17.0.3 to get rid of it

05/10/2023

These are the functions activated by Double Tap on the Apple Watch Series 9 and Apple Watch Ultra 2

05/10/2023
Gearrice
Facebook Twitter Instagram Pinterest
  • Privacy Policy
  • Terms and Conditions
  • Write For Us
© 2023 Gearrice.

Type above and press Enter to search. Press Esc to cancel.