Main menu

Pages

Spy on Telegram and Signal users


Spy on Telegram and Signal users


new spy software programs that target users of Telegram and Signal


According to recent findings from cybersecurity firm ESET, new malicious programs target users of the instant messaging services Telegram and Signal on Android devices.


The company's security researchers discovered that the perpetrators of these attacks had made phony versions of the Telegram and Signal apps, released them in the Google Play Store, and labeled them as "Plus" or "Premium" to trick users into thinking they had more features.


These programs were downloaded to users' smartphones from external websites or authorized app stores like the Google Play Store or the Samsung Galaxy Store.


After security reports about the fraudulent chat apps circulated, the two marketplaces removed them.


Hacker News, a cybersecurity website, reported that these fake applications infected users' devices with the BadBazaar spyware, which is malicious software code that was first identified in November 2022 as being used to target the Uyghur community in China.


In addition to stealing information from the original Signal and Telegram programs, such as PIN verification codes and conversation backups, these malicious applications are made to take private data from users' devices, such as call records, SMS messages, geographic locations, and more.


Users of Telegram are routinely the target of security assaults, but Signal users, which aims to offer an instant messaging experience that improves user security and privacy, maybe the first to have been singled out.


It is important to note that this assault has nothing to do with messaging application original versions because their owners will be secure as long as they do not have any fake versions on them.


Security reports indicate that the victims were dispersed across a number of nations, including the United States and a few European and Asian nations.

Comments