Category: IT|Feb 4, 2018 | Author: Admin

BEWARE: Cyber Criminals Using Malware to Hack Data

Share on

A secret hacking group, which was said to have carried out a worldwide mobile espionage campaign, has been recently uncovered because of an exposed server on the internet.

The Lebanese General Directorate of General Security, GDGS, is being suspected by researchers to have supported this act of cybercrime.

A secret hacking group, which was said to have carried out a worldwide mobile espionage campaign, has been recently uncovered because of an exposed server on the internet.

The Lebanese General Directorate of General Security, GDGS, is being suspected by researchers to have supported this act of cybercrime.

According to reports, the hackers collected ‘hundreds of gigabytes’ of information and data, including intellectual property and personally identifiable information.

The espionage campaign was in operation from 2012 and it is being claimed that thousands of people became the victims of this cybercrime in more than 21 countries.

The hacker group named Dark Caracal were able to target military personnel, journalists, medical professionals, activists, lawyers and many people from other significant professions.

The stolen data included documents, call records, browsing history, secure messaging client content, photos, contact information, and location data – all of this enough to spy on and identify an individual and monitor their personal life closely.

The hackers utilized basic techniques such as sending posts on different Facebook groups or WhatsApp messages, encouraging users to click on the links and access sites.

This installs a malware on the system that forces users to install a fake app, which seems to be from Google Play Store.

Such hacking is common, and one needs to be cautious.

Some Precautionary Tips

  • Stay alert for permissions that do not seem appropriate. For example, if a calculator application wants access to your messages, you should stay away from it. After all, why would such an app need to access your messages?
  • Do not download applications from non-verifiable or unknown sources.
  • Use the Google’s recently launched app, “Google Play Protect”.
  • Do not input confidential information such as personal identifiers, bank account information on arbitrary apps.
  • Set your application store settings to ‘Do not allow third-party app downloads from untrusted sites’

If your gut tells you something isn’t right with an app or it seems fishy keep away from it to secure your privacy. Cyber criminals are getting smart, you should up your game, too.

Sponsored Ads:

Comments:


Giant change at Google could change everything

Category: Google|Apr 19, 2024 | Author: Admin

Now Windows will be bothered about this too

Category: Microsoft|Apr 18, 2024 | Author: Admin

Test the new AI trick with Logitech

Category: IT|Apr 17, 2024 | Author: Admin

The US Government Has a Microsoft Problem

Category: Microsoft|Apr 16, 2024 | Author: Admin

Now comes the commercial

Category: Microsoft|Apr 15, 2024 | Author: Admin

Linux Foundation is leading fight against fauxpen source

Category: IT|Apr 14, 2024 | Author: Admin

3000 news articles!!! Happy reading!

Category: General|Apr 13, 2024 | Author: Admin

Google shuts down new product

Category: IT|Apr 12, 2024 | Author: Admin

YouTube CEO warns OpenAI that training models on its videos is against the rules

Category: IT|Apr 11, 2024 | Author: Admin

Google unveils Arm-based data center processor, new AI chip

Category: Google|Apr 10, 2024 | Author: Admin

Microsoft to invest $2.9 bln to expand AI, cloud infra in Japan

Category: Microsoft|Apr 9, 2024 | Author: Admin

Nintendo shuts off online access for 3DS and Wii U today

Category: IT|Apr 8, 2024 | Author: Admin

Musk challenges Brazil's order to block certain X accounts

Category: IT|Apr 7, 2024 | Author: Admin

Here’s how much Microsoft will charge for Win10 security updates once support ends

Category: Microsoft|Apr 6, 2024 | Author: Admin

Samsung has beaten Apple again

Category: IT|Apr 5, 2024 | Author: Admin
more