Organizations that have BYOD policies need to make sure personally owned mobile devices don’t offer a path into their apps and network, for attackers [277 words].
Here are the two threats
- Malicious mobile apps on Google Play distributing ads/phishing link serving malware
A software developer with the name Mobile apps Group has published a family of four malicious applications on Google’s official Play mobile app store, accoding to Malwarebytes. The applications are infected with Android/Trojan.HiddenAds.BTGTHB and have amassed more than 1 million downloads between them.
The four apps are:
Bluetooth Auto Connect: 1,000,000+ downloads
Bluetooth App Sender: 50,000+ downloads
Driver: Bluetooth, Wi-Fi, USB: 10,000 + downloads
Mobile transfer: smart switch: 1,000+ downloads
Dangerous feature: The malware is designed to remain dormant for 72 hours after installation before it starts displaying ads or serving up links to phishing sites, in different browser tabs, every two hours.
Source: Malwarebytes
2. Booby-trapped VPN app deploys SandStrike infostealer on Android systems
Researchers from Kaspersky have spotted an attacker attempting to install spyware called “SandStrike” for stealing sensitive data–such as call logs and contact lists–from Android devices via a boob-trapped VPN app. The threat group behind the campaign is targeting members of the persecuted Baha’i community in Iran.
Of note: The attacker is using Facebook and Instagram accounts with high-quality religious themed images and content to lure victims in the target group to a Telegram channel. The channel offers visitors a free VPN app purportedly to access sites they normally wouldn’t be able to access because they are banned. Once downloaded, the VPN apps steals sensitive data.
Source: Kaspersky