TLDTR: A new variant of Android malware called MoqHao has been discovered. This variant has the ability to auto-execute on infected devices without requiring any user interaction. The malware is associated with a Chinese financially motivated cluster and targets Android users in France, Germany, India, Japan, and South Korea. It is distributed via smishing techniques and runs automatically upon installation, prompting victims to grant risky permissions. The malware is equipped with features that allow it to harvest sensitive information and enable/disable Wi-Fi. McAfee has reported the findings to Google, which is working on implementing mitigations in a future Android version.
Evolved: MoqHao Android Malware Packs Auto-Execution Punch
Latest from News
Are British SMBs ready to level up with Cyber Security Bill?
TLDR: The Cyber Security and Resilience Bill aims to tighten supply chain security in the UK. Experts are concerned about the impact of the
TfL cyber attack forces staff to work remotely
TLDR: TfL Cyber Attack Disrupts Services, Forcing Staff to Work From Home Key Points: A cyber attack targeting Transport for London (TfL) has disrupted
Mustang Panda: Worm-Powered USB Attack Plan
TLDR: Mustang Panda is back with new self-propagating malware spreading through USB drives and spear-phishing. They are targeting government entities in the Asia-Pacific region
Researcher hacks CI/CD pipelines for complete server control
TLDR: A security researcher exploited CI/CD pipelines to gain full server access by exploiting a security flaw in an exposed .git directory. The attacker
CISA alerts to three active exploits in the wild
TLDR: Key Points: CISA warns of three actively exploited vulnerabilities affecting ImageMagick, Linux Kernel, and SonicWall SonicOS Vulnerabilities could lead to remote code execution,