boobytrapped messaging apps used
Last Updated : GMT 06:49:16
Arab Today, arab today
Arab Today, arab today
Last Updated : GMT 06:49:16
Arab Today, arab today

for spying

Booby-trapped messaging apps used

Arab Today, arab today

Arab Today, arab today Booby-trapped messaging apps used

A cyberespionage campaign that used fake versions of secure messaging services like WhatsApp.
Washington - Arab Today

An espionage campaign using malware-infected messaging apps has been stealing smartphone data from activists, soldiers, lawyers, journalists and others in more than 20 countries, researchers said in a report Thursday.

A report authored by digital rights group Electronic Frontier Foundation and mobile security firm Lookout detailed discovery of "a prolific actor" with nation-state capabilities "exploiting targets globally across multiple platforms."

Desktop computers were also targeted, but getting into data-rich mobile devices was a primary objective, according to the report.

With fake versions of secure messaging services like WhatsApp and Signal, the scheme has enabled attackers to take pictures, capture audio, pinpoint locations, and mine handsets for private data.

EFF and Lookout researchers dubbed the threat "Dark Caracal."

People in the US, Canada, Germany, Lebanon, and France have been hit by Dark Caracal, according to EFF director of cybersecurity Eva Galperin.

"This is a very large, global campaign, focused on mobile devices," Galperin said.

"Mobile is the future of spying, because phones are full of so much data about a person's day-to-day life."

Hundreds of gigabytes of data have been taken from thousands of victims in more than 21 countries, according to Lookout and the EFF.

There were indications that Dark Caracal might be an infrastructure hosting a number of widespread, global cyberespionage campaigns, some of which date back years, the report said.

Because the apps fool people into thinking they are legitimate, users give them access to cameras, microphones and data.

"All Dark Caracal needed was application permissions that users themselves granted when they downloaded the apps, not realizing that they contained malware," said EFF staff technologist Cooper Quintin.

"This research shows it's not difficult to create a strategy allowing people and governments spy to on targets around the world."

Researchers reported that they tracked Dark Caracal to a building in Beirut belonging to the Lebanese General Security Directorate.

Analysis showed that devices of military personnel, businesses, journalists, lawyers, educators, and medical professionals have been compromised, according to the report.

"Not only was Dark Caracal able to cast its net wide, it was also able to gain deep insight into each of the victim's lives," the report concluded.

Cyber security professionals consistently warn people to be wary when downloading software, avoiding programs shared through links or email and instead relying on trusted sources.

Source: AFP

 

arabstoday
arabstoday

GMT 03:59 2017 Sunday ,31 December

golf, tweets and phone calls

GMT 05:39 2017 Friday ,29 December

US Library of Congress backtracks

GMT 05:33 2017 Friday ,15 December

US faces moment of truth on 'net neutrality'

GMT 04:29 2017 Thursday ,14 December

Twitter makes 'tweetstorms' easier

GMT 08:31 2017 Monday ,11 December

Rules set for vote, firestorm won't die
Arab Today, arab today

Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

boobytrapped messaging apps used boobytrapped messaging apps used

 



Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

boobytrapped messaging apps used boobytrapped messaging apps used

 



GMT 20:28 2017 Monday ,13 February

EgyptAir to receive second next-generation Boeing

GMT 05:13 2017 Thursday ,16 February

Central bankers take up arms against protectionism

GMT 12:53 2017 Friday ,13 October

S&P warns of Catalan recession if crisis drags

GMT 13:37 2017 Thursday ,16 March

Smith leads Australia's revival in Ranchi test

GMT 18:39 2017 Tuesday ,11 April

Comedian John Bishop returns to Dubai

GMT 21:08 2017 Tuesday ,31 January

Motorcity honoured as ‘Distributor Champion’

GMT 00:14 2017 Tuesday ,28 February

Mohammad receives Pakistani Chief of Army Staff

GMT 23:37 2017 Tuesday ,15 August

Civilians Killed in Deadly Blast in Afghanistan

GMT 08:27 2011 Tuesday ,07 June

3 women charged with robbing vets\' graves

GMT 20:01 2014 Wednesday ,10 December

27 hard questions you need to ask

GMT 16:44 2017 Monday ,25 December

DFM welcomes listing of AWTAD on "Second Market"

GMT 23:23 2017 Sunday ,24 December

Abdullah bin Zayed meets Canada's Minister of Defence

GMT 18:44 2016 Sunday ,04 September

Israel Strikes Northern Gaza Strip

GMT 18:17 2012 Friday ,18 May

Carmen Suleiman hits the books

GMT 09:32 2017 Wednesday ,20 December

Gayeon Lee appoints Dyelog

GMT 06:39 2014 Monday ,01 September

May 21 - June 20
Arab Today, arab today
 
 Arab Today Facebook,arab today facebook  Arab Today Twitter,arab today twitter Arab Today Rss,arab today rss  Arab Today Youtube,arab today youtube  Arab Today Youtube,arab today youtube

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2025 ©

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2025 ©

arabstoday arabstoday arabstoday arabstoday
arabstoday arabstoday arabstoday
arabstoday
بناية النخيل - رأس النبع _ خلف السفارة الفرنسية _بيروت - لبنان
arabstoday, Arabstoday, Arabstoday