Your daily selection of the hottest trending tech news!
According to E Hacking News – Latest Hacker News and IT Security News (This article and its images were originally posted on E Hacking News – Latest Hacker News and IT Security News September 3, 2018 at 01:31PM.)
A new spyware called BusyGasper, loaded with an unusual set of highly effective features of the spyware, are expert at collecting and exfiltrating data from Android phones
The malware has more than 100 uniquely implemented features like device sensor listeners, motion detectors, and the ability to detect a user’s command on touch screens.
“BusyGasper is not all that sophisticated but demonstrates some unusual features for this type of threat. From a technical point of view, the sample is a unique spy implant with stand-out features… that have been implemented with a degree of originality,” wrote Kaspersky Lab researcher Alexey Firsh.
In the blog, the researcher wrote that the malware existed since at least May 2016, but managed to remain underground for a considerable time. However, until now there are less than 10 victims, all based in Russia.
“While looking for the infection vector, we found no evidence of spear-phishing or any of the other common vectors,” Firsh wrote. “But some clues, such as the existence of a hidden menu for operator control, point to a manual installation method – the attackers used physical access to a victim’s device to install the malware.”
The spyware is capable of spying on-device sensors (including motion detectors), exfiltrating data from messaging apps (e.g., WhatsApp, Viber, and Facebook), keylogging, and bypassing the Doze battery saver.
According to the reports, the attacker has coded the spyware as such where the screen of the device assigns a definite and unique value to the layout area of the keyboard. “The listener can operate with only coordinates, so it calculates pressed characters by matching given values with hardcoded ones.”
Full Article | Stay current with our live technology feed.
- Got any news, tips or want to contact us directly? Feel free to email us: email@example.com.
To see more posts like these; please subscribe to our newsletter. By entering a valid email, you’ll receive top trending reports delivered to your inbox.
This article and images were originally posted on [E Hacking News – Latest Hacker News and IT Security News] September 3, 2018 at 01:31PM. Credit to Author and E Hacking News – Latest Hacker News and IT Security News | ESIST.T>G>S Recommended Articles Of The Day.