It has been reported that a cyber espionage group believed to be out of Iran and known for targeting telecommunications providers and government bodies in the Middle East has added to its arsenal for targeting Android devices. The so-called MuddyWater hacking group, which has been in action since at least 2017, also has created new backdoor malware for spying on its targets, and has been spotted employing false flag tactics to throw off researchers and investigators, according to researchers at Trend Micro, who here today shared the details of the Iranian hacking team’s latest activities. 

Tom Davison, EMEA Director at Lookout:

- isbuzz expert 1 260x300 - ‘MuddyWater’ APT Spotted Attacking Android“This is another example of a potential nation-state actor turning to mobile as a way to enrich their surveillance capabilities. The breadth of information that can be obtained from a mobile device makes them an attractive target.  Users struggle to identify phishing links on mobile and are often willing to download unvetted . This, coupled  with a lower instance of security solutions on mobile, makes the job of the actors even easier” 

 



Source link
Based Blockchain Network

No tags for this post.

LEAVE A REPLY

Please enter your comment!
Please enter your name here