“The main purpose of the clippers we discovered is to intercept the victim’s messaging communications and replace any sent and received cryptocurrency wallet addresses with addresses belonging to the attackers. ESET Research immediately reported the fraudulent ads and related YouTube channels to Google, which promptly shuttered them all. The threat actors first set up Google Ads leading to fraudulent YouTube channels, which then redirected the viewers to copycat Telegram and WhatsApp websites. Because both Telegram and WhatsApp have been blocked in China for several years now, with Telegram being blocked since 2015 and WhatsApp since 2017, people who wish to use these services have to resort to indirect means of obtaining them. Moreover, some of these apps use optical character recognition (OCR) to recognize text from screenshots stored on the compromised devices, which is another first for Android malware.īased on the language used in the copycat applications, it seems that the operators behind them mainly target Chinese-speaking users. This was the first time ESET Research had seen Android clippers focusing specifically on instant messaging. All of them are after victims’ cryptocurrency funds, with several targeting cryptocurrency wallets. Most of the malicious apps we identified are clippers - a type of malware that steals or modifies the contents of the clipboard. DUBAI, DUBAI, UNITED ARAB EMIRATES, March 23, 2023/ / - SET researchers have discovered dozens of copycat Telegram and WhatsApp websites targeting mainly Android and Windows users with trojanized versions of these instant messaging apps.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |