MoqHao Android Malware Evolves with Auto-Execution Capability

A new variant of MoqHao Android malware silently auto-executes upon installation, snatching data, and hijacking Wi-Fi.

The Hacker News
MoqHao Android Malware Evolves with Auto-Execution Capability

A new variant of MoqHao Android malware silently auto-executes upon installation, snatching data, and hijacking Wi-Fi.

The Hacker News

This blog post is *really* interesting: https://www.mcafee.com/blogs/other-blogs/mcafee-labs/moqhao-evolution-new-variants-start-automatically-right-after-installation/

So, now, Android malware can automatically execute after installation. They need not be launched by the end-user.
The malware uses the "ContactDirectory" direction feature which is checked at install time.

#Android #malware #moqhao

Hey :)

Yesterday we published the third blog about our #MoqHao's analysis. We detected at least 1.5 millions victims since the end of 2022, and now every continent is targeted, etc

IOCs (+port pairing 🍷) and TTPs here: https://team-cymru.com/post/moqhao-part-3-recent-global-targeting-trends

@teamcymru_S2

MoqHao Part 3: Recent Global Targeting Trends

Introduction This blog post is part of an ongoing series of analysis on MoqHao (also referred to as Wroba and XLoader), a malware family commonly associated with Roaming Mantis. MoqHao is generally used to target Android users, often via an initial attack vector of phishing SMS messages (smishing). The threat group behind Roaming Mantis are characterized as Chinese-speaking and financially motivated, first public acknowledgement goes back to around 2018. The group has historically targeted count

Team Cymru