Aug. 31, 2023, 9:17 a.m. | Help Net Security

Help Net Security www.helpnetsecurity.com

ESET researchers have identified two active campaigns targeting Android users, where the threat actors behind the tools for Telegram and Signal are attributed to the China-aligned APT group GREF. Most likely active since July 2020 and since July 2022, respectively for each malicious app, the campaigns have distributed the Android BadBazaar espionage code through the Google Play store, Samsung Galaxy Store, and dedicated websites posing as legitimate encrypted chat applications — the malicious apps are … More


The post …

android android users app apps apt campaigns china cybercrime cybercriminals cyber espionage cybersecurity data distributed don't miss eset found galaxy galaxy store google google play july july 2022 malicious malicious app malware play researchers samsung samsung galaxy samsung galaxy store signal smartphones software store targeting telegram threat threat actors tools

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)