Google’s Threat Analysis Group reported that Italian spyware vendor RCS Labs cooperated with some Internet service providers to install spyware on users’ smartphones.
An authorised drive-by attack refers to tricking users into downloading software containing malicious code that enables additional downloads without the target’s knowledge. The researchers noted that the malware was disguised as messaging applications if Internet service providers weren’t involved.One method shows attackers using a fake Facebook support page with links to install Facebook, WhatsApp, or Instagram.
“This sideloading works because the app is signed with an enterprise certificate, which can be purchased for $299 via the Apple Enterprise developer program,” Google Zero security researcher Ian BeerFor Android devices, the downloaded APK required that the installation of applications from unknown sources be enabled.
日本 最新ニュース, 日本 見出し
Similar News:他のニュース ソースから収集した、これに似たニュース記事を読むこともできます。
ソース: SABCNews - 🏆 37. / 51 続きを読む »
ソース: SABCNews - 🏆 37. / 51 続きを読む »