StrongPity’s backdoor is fitted with numerous spying options and might file telephone calls, accumulate texts, and collect name logs and get in touch with lists
This week, the ESET analysis group printed their findings about an espionage marketing campaign by the StrongPity APT group that spreads a completely practical, however trojanized model of the reliable Telegram app for Android. The malicious app – which has numerous spying options, together with recording telephone calls and amassing SMS messages – is distributed by way of a copycat web site that mimics Shagle, an grownup video-chat service. By no means heard about Shagle? Watch the video to study extra not simply in regards to the platform, however particularly in regards to the StrongPity assaults and its targets and techniques.
For a full technical write-up, head over right here: StrongPity espionage campaign targeting Android users.