• Dapps:16.23K
  • Blockchains:78
  • Active users:66.47M
  • 30d volume:$303.26B
  • 30d transactions:$879.24M

Cybersecurity experts uncover new SpyAgent malware on Android

user avatar

by Giorgi Kostiuk

a year ago


  1. What is SpyAgent?
  2. How the malware works
  3. Precautionary measures

  4. McAfee cybersecurity firm has found a new Android malware called SpyAgent, capable of stealing sensitive information from smartphones.

    What is SpyAgent?

    SpyAgent is a malware that uses Optical Character Recognition (OCR) technology to scan screenshots and images stored on a device to extract private data such as passwords, crypto wallet keys, and other sensitive text.

    How the malware works

    McAfee explained that SpyAgent spreads through links sent in text messages. When a user clicks on the link, it redirects them to a website and asks them to download an app. However, this app is actually the SpyAgent malware. Once installed, it asks for permission to access important areas of the phone, such as contacts, messages, and stored files. This gives the hackers access to sensitive data on the device. These fake apps often pretend to be useful services, like banking, government, or streaming apps.

    Precautionary measures

    So far, the malware has mainly been found in South Korea, where McAfee has detected over 280 harmful apps containing this malware. The cybersecurity company urged Android users to be careful when downloading apps and avoid clicking on unknown links, especially those received via text messages.

    This malware discovery is part of a growing trend in 2024, where similar threats have been identified on different platforms. For instance, a malware called Cthulhu Stealer was recently found targeting Mac users, while a vulnerability in Google Chrome, linked to a North Korean hacker group, was reported by Microsoft.

0

Rewards

chest
chest
chest
chest

More rewards

Discover enhanced rewards on our social media.

chest

Other news

Legal and Technical Challenges in Investigating AI-Generated Abuse

chest

Law enforcement agencies face significant challenges in investigating AI-generated abuse due to the anonymous nature of online platforms, complicating the identification of perpetrators and victims.

user avatarTenzin Dorje

New Jersey Lawsuit Highlights Legal Challenges of AI-Generated Nonconsensual Pornography

chest

A groundbreaking lawsuit in New Jersey reveals the legal challenges victims face against AI-generated nonconsensual pornography.

user avatarElias Mukuru

ClothOff Case Exposes Jurisdictional Complexities in AI-Generated Abuse

chest

The lawsuit against ClothOff reveals the jurisdictional challenges in prosecuting international operators of AI-generated pornography.

user avatarAisha Farooq

Need for Enhanced Operational Security in Crypto

chest

Experts emphasize the importance of investing in operational security to combat the rise of social engineering attacks in the crypto space.

user avatarBayarjavkhlan Ganbaatar

Solana and FLOKI: Diverging Market Outlooks

chest

In the current market analysis, FLOKI is showing promising signs of a potential rally, while Solana is expected to face bearish trends, with predictions of a dip to $13.15.

user avatarKenji Takahashi

NEAR Protocol Improves Usability Amidst Market Challenges

chest

NEAR Protocol has improved usability features but faces challenges with supply flexibility.

user avatarMohamed Farouk

Important disclaimer: The information presented on the Dapp.Expert portal is intended solely for informational purposes and does not constitute an investment recommendation or a guide to action in the field of cryptocurrencies. The Dapp.Expert team is not responsible for any potential losses or missed profits associated with the use of materials published on the site. Before making investment decisions in cryptocurrencies, we recommend consulting a qualified financial advisor.