Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hackers Open the feature -related signaling devices for malicious QR -codes
Global Security

Hackers Open the feature -related signaling devices for malicious QR -codes

AdminBy AdminFebruary 19, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 19, 2025Red LakshmananMobile Safety / Cyber ​​-bue

Several actors coordinated by Russia were noted, oriented to people who are of interest, through an application -focused application to gain unauthorized access to their accounts.

“The Most Novel and Widely used Technique Underpinning Russian-Aligned Accounts is the abuse of the app’s legitimate ‘linked devices’ feather that enables sigal Concurrently, “The Google Threat Intelligence Group (Gtig) – Note In the report.

As a result of the attacks revealed by the technological giant exploration groups, the threat subjects, including tracking as the UNC5792, resorted to malicious QR codes, which when scanning would bind the victim’s account with a signal.

As a result, future reports are transmitted synchronously both victims and actor threats in real time, thereby giving the subjects a threat to the constant ways to eavesdrop the victim’s conversations. Google said UAC-0195.

Cybersecurity

These QR -codes are known to masquerade as group invitations, security notifications, or legitimate instructions for combination of devices from the Signal site. Alternatively, malicious QR codes, which are associated with devices, were found in phishing pages, which are supposed to be specialized applications used by Ukrainian military.

“The UNC5792 has conducted modified invitations to the signal group to the infrastructure-controlled actor designed to look identical to the legal invitation of the signal group,” Google said.

Another actor threatened with signal targeting is UNC4221 (he’s UAC-0185(

Also used is a light useful load of JavaScript, which can collect basic user data and geolocation data through phishing pages.

Outside the UNC5792 and UNC4221, some other competition groups that have prepared their attractions on the signal are the sandwich (aka APT44), which used the Windows Party called Wavesign; Turla, which directed the light scenario of PowerShell; and UNC1151, which was attached to use the Robocopy utilities for an expansion of signal messages from the contaminated desktop.

Disclosure from Google is a little over a month after the Microsoft intelligence group attributed Russian actor threats known as Star Blizzard in a fining company that uses a similar feature that is related to the device to steal WhatsApp accounts.

Last week Microsoft and Volexity also disclosed What several Russian threatens use technique called Phishing Code Code to enter the victim accounting, focusing on them using messaging applications such as WhatsApp, Signal and Microsoft.

“The operating emphasis on the signal of many threat subjects in recent months has been an important warning about the growing threat to provide applications for messaging, which are certainly activated in the near future,” Google said.

Cybersecurity

“As reflected in the extensive efforts to compromise signal accounts, this threat to providing messaging applications is not limited to the remote unlocked Target device.”

Disclosure also follows from the detection of a new search engine optimization company (SEO), which uses fake pages to download, presenting themselves for popular applications such as signal, line, Gmail and Google Translate to provide back files aimed at users aimed at Chinese voices.

“The performers put through fake download pages follow a consistent execution scheme, which includes temporary file extraction, processes, security modifications and network communications, Hunt.io – NoteAdding samples that have functionality similar to the infosteoler associated with the strain of malware called microclip.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.