Android spyware in development plunders WhatsApp data, private conversations
#1
Quote:The malware's code hosts a variety of surveillance functions and is available to the public.

A new strain of Android-based spyware able to rifle through WhatsApp conversations has been discovered as an open development project online.

The malware, originally discovered by ESET researcher Lukas Stefanko, is not only able to compromise WhatsApp messages but also contains a variety of standard surveillance features.

An investigation into the new spyware (.PDF) conducted by G DATA SecurityLabs uncovered the malware's code in a public repository titled "OwnMe" on GitHub.
The malware consists of a MainActivity.class which launches the OwnMe.class service. A pop-up message is then shown to the Android user with the text, "Service started," which implies the malware is still in development.

Source: https://www.zdnet.com/article/android-sp...ersations/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Messages In This Thread
Android spyware in development plunders WhatsApp data, private conversations - by silversurfer - 26 September 18, 13:09

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
CrystalDiskInfo 9.8.0 [2026/02/15]
9.8.0 ​ Removed...harlan4096 — 17:07
K-Lite Codec Pack 19.4.5 / 19.4.9 Update
Changes in 19.4.9 ...harlan4096 — 16:30
Brave 1.87.188 (Chromium 145.0.7632.76)
Release v1.87.188 ...harlan4096 — 16:29
Opera 127.0.5778.64
New update to Oper...harlan4096 — 16:28
INTEL Arc Graphics 32.0.101.8509 driver
INTEL Arc Graphics...harlan4096 — 16:27

[-]
Birthdays
Today's Birthdays
avatar (39)MezirLal
Upcoming Birthdays
avatar (38)showercurtains
avatar (49)PeterWhink
avatar (46)dimaWeami
avatar (39)TranoTymn
avatar (38)Michaelaburi
avatar (46)dpascoal
avatar (51)Ronaldduh
avatar (39)legalgauch
avatar (44)Baihu
avatar (27)RaseinsLikes

[-]
Online Staff
There are no staff members currently online.

>