Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Lightspy expands to 100+ commands, increasing control over Windows, MacOS, Linux and Mobile
Global Security

Lightspy expands to 100+ commands, increasing control over Windows, MacOS, Linux and Mobile

AdminBy AdminFebruary 25, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Cybersecurity researchers have indicated an updated Lightspy implant, which is supplied by an expanded data collection set to obtain information from social media platforms such as Facebook and Instagram.

Lightspy – this is the name given Modular spy software it efficient Infecting both Windows and Apple systems to collect data. It was first recorded in 2020, focusing on Hong Kong users.

This includes information about the Wi-Fi network, screenshots, placement, icloud key, sound recordings, photos, browser history, contacts, call history and SMS messages, as well as data from various applications such as files, rubles, Mail Master, Telegram, Telegram, Telegram, Telegram. Tencent QQ, WeChat, and WhatsApp.

At the end of last year, OPHERFABIC told the updated version of malicious software in detail, which includes devastating capabilities to prevent a compromised device, along with the expansion of the number of supported plugins from 12 to 28.

Previous conclusions also found potential overlapping between light and malicious Android software Dragoneggisolation of a cross -threatening platform nature.

The latest Hunt.io analysis for malicious infrastructure and control (C2), associated with spyware, revealed the support of more than 100 teams covering Android, iOS, Windows, MacOS, routers and Linux.

Cybersecurity

“The new team list moves focus from direct data collection to wider operational management, including transfer management (” Transport control “) and tracking the plugins (” Details of the plugin version “),” The company – Note.

“These additions suggest a more flexible and adapted basis, allowing Lightspy operators to manage the deployment on multiple platforms more effectively.”

Among the new teams is the ability to target Facebook and Instagram database files to extract data from Android devices. But in an interesting turn, the threatening actors removed iOS plugins related to devastating actions on the victim’s host.

Also found 15 Windows plugins designed to supervise the system and data collection, and most of them are aimed at keyboard, audio recording and USB interaction.

The threat intelligence company said it also revealed the final point (“/telephone/phone”) on the administrator panel, which provides users in the system of opportunities to remotely control infected mobile devices. It is currently unknown whether new developments are presenting or not previously documented versions.

“Transition from targeting messaging applications to Facebook and Instagram expands the ability of Lightspy to collect private messages, contacts and metadata accounting from widely used social platforms,” ​​said Hunt.io.

“The extraction of these database files can provide the attackers with saved conversations, connections of users and potentially related data sessions, increasing observation capabilities and opportunities for further operation.”

Disclosure occurs when CYFIRMA revealed details of the malicious Android software, dubbed Spiclend, which is masked as a financial application called Finance Simplify (APK NAME “com.someca.count”) at the Google Play store, but engaged Predatory lending, blackmail and extortion aimed at Indian users.

“Using target targeting for location, the application reflects a list of unauthorized credit applications that work completely within the Webview, allowing attackers to bypass close attention in the store,”-the company – Note.

“After installation, these credit applications collect tangible users’ sensitive data, perform operational lending practices and use blackmail tactics to extort money.”

Some of the advertising credit applications – Kreditpro (formerly KreditApple), Moneyape, Stashfur, Fairbalance and Pokketme. Users who set finances simplified from the -in the borders of India provide harmless Webview, which lists various calculators for personal finance, accounting and taxation, believing that the company is designed to specifically orientation to Indian users.

The app is no longer available to download from the official Android App market. According to the statistics available on the tower, the app was publish About mid -December 2024 and assembled more than 100,000 installations.

Cybersecurity

“Originally presented as a harmless financial management application, it loads the app for loan loan from external boot URL, which after installation acquires extensive access to secret data, including files, contacts, call logs, SMS, clipboard content and even Camera, – said Cyfirma.

Indian retail clients have also been the goal of another company that distributes malicious software, which calls Finsteler, which preaches for legal bank applications, but designed to collect credentials to enter and facilitate financial frauds, implementing unauthorized transactions.

“Distributed through phishing links and social engineering, these counterfeit applications carefully mimic legitimate applications of banks, deceiving users to disclose credentials, financial data and personal data,” company, company, company, company, company, company, company, company, company, company, company, company, company, company, company – Note.

“Using Telegram Bots, malicious software can receive instructions and send stolen data without raising the suspected safety systems to detect and lock communication.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.