A new #SpyNote report is out! 🚨 Dive into the tactics of this Android RAT campaign, from dynamic payload decryption to new obfuscation methods. Learn how threat actors are using deceptive Google Play Store clones to target users:

https://dti.domaintools.com/spynote-malware-part-2/

πŸ€– Android devices can be a major cybersecurity hazard for businesses. See how #ANYRUN helps detect #malicious files early, accelerate investigations, and improve threat response.

Analysis of #SalvadorStealer and #SpyNote insideπŸ‘‡
https://any.run/cybersecurity-blog/how-android-malware-targets-businesses/?utm_source=mastodon&utm_medium=post&utm_campaign=android_targets_business&utm_term=160725&utm_content=linktoblog

#infosec #cybersecurity

Why Businesses Are at Risk of Android Malware Attacks

Discover how Android apps compromise businesses’ security and learn about the power of sandbox analysis for early detection of cyber threats.

ANY.RUN's Cybersecurity Blog

🚨 Newly Registered Domains Distributing SpyNote Malware

The latest DomainTools Investigations (DTI) analysis reveals that deceptive websites hosted on newly registered domains are being used to deliver the potent AndroidOS SpyNote malware. These sites mimic the Google Chrome install page on the Google Play Store to lure victims into downloading SpyNote, a powerful Android remote access trojan (RAT) used for surveillance, data exfiltration, and remote control.

πŸ” Key Findings:

πŸ”·Deceptive Techniques: Websites mimic popular app installation pages to trick users.
πŸ”·Domain Patterns: Common patterns in domain registration and website structure.
πŸ”·Language Indicators: Mix of English and Chinese-language delivery sites.
πŸ”·Malware Capabilities: Extensive surveillance, data theft, and remote control functionalities.

SpyNote's sophisticated capabilities make it a significant threat to individuals and organizations. It can steal sensitive data, activate cameras and microphones, manipulate calls, and even remotely wipe or lock devices. The malware's persistence often requires a factory reset for complete removal.

Check out the full analysis here: https://dti.domaintools.com/newly-registered-domains-distributing-spynote-malware/?utm_source=Mastodon&utm_medium=Social&utm_campaign=SpyNote-GooglePlayStore

#SpyNote #Malware #ThreatIntelligence #CyberSecurity #InfoSec

Newly Registered Domains Distributing SpyNote Malware - DomainTools Investigations | DTI

Deceptive websites hosted on newly registered domains are being used to deliver AndroidOS SpyNote malware. These sites mimic the Google Chrome install page on the Google Play Store.

DomainTools Investigations | DTI

🌐 Campagne #Malware in Italia - Week 49

πŸ“ž #APK Bank
πŸ•΅οΈβ€β™‚οΈ #SpyNote / #Antidot / #Irata / #DroidBot / #SmSSpy
βœ‰οΈ Email Campaigns
πŸ’Ό #Formbook: Preventivo
πŸ“¦ #AgentTesla: Spedizione
πŸ“‘ #Remcos: Fattura
πŸ’° #GuLoader: Pagamento
🧾 #XWorm: Fattura
🐍 #SnakeKeyLogger: Bonifico
πŸ”– #Lokibot: Prezzo
©️ #Rhadamanthys: Copyright
πŸ“„ #VipKeyLoggerL: Documento

πŸ“’ Resta vigile! 🚨

#mwitaly #CyberSecurity #StaySafe

πŸ“’ Campagne #Malware in Italia – Week 48

πŸ” Minacce rilevate:
#Formbook – πŸ’° Prezzi e Ordini
#SpyNote / #Irata – πŸ“± APK Bank
#SnakeKeyLogger – πŸ€‘ Acquisti
#AsyncRAT – ⛓️‍πŸ’₯ Copyright
#XWorm – 🧾 Fattura
#VipKeyLogger – 🎁 Offerta
#AgentTesla – 🚚 Spedizione

πŸ“Œ #Malware #Italy #mwitaly

πŸ“’ Campagne #Malware in Italia – Week 47

πŸ” Minacce rilevate:
#SpyNote / #Irata – πŸ“± APK Bank
#Remcos – πŸ’³ Pagamento Bancario
#XWorm – 🧾 Fattura
#VipKeyLogger – 🎁 Offerta
#SnakeKeyLogger – πŸ“¦ Ordine
#Vidar – πŸ“© Fattura via PEC
#Formbook – πŸ’° Prezzi
#AgentTesla – 🚚 Spedizione
#Lumma – βš–οΈ Copyright

πŸ“Œ #Malware #Italy #mwitaly

πŸŽƒ Campagne #Malware #Italy Week 43 πŸŽƒ

πŸ•΅πŸ»β€β™‚οΈ #SpyNote / #EagleSpy: APK Bank
πŸ’° #Remcos: Pagamento Bancario
🐍 #SnakeKeyLogger: Ordine
πŸ“§ PureLogs: Posta Certificata
🏨 #AgentTesla: Booking
πŸ“„ #XWorm: Fattura
πŸ“¦ #NjRat: Spedizione
🚚 #Guloader: DHL

#mwitaly

Campagne #Malware #Italy Week 41

☠️πŸ”₯πŸ’£πŸ‘»

#SpyNote: APK Bank
#Formbook: Estratto Conto
#SnakeKeyLogger: Pagamento Swife
#AgentTesla: Booking
#Remcos: Richiesta Prezzi
#XWorm: Fattura Google

#mwitaly

🚨 Nuova campagna di phishing bancario diffonde il #malware Android #EagleSpy!

Questa minaccia, simile a #CraxsRAT e #SpyNote, ruba dati sensibili dai dispositivi Android.

Scopri di piΓΉ e proteggi il tuo smartphone!

πŸ‘‰ https://www.d3lab.net/nuova-campagna-di-phishing-diffonde-malware-android-eaglespy/

#Cybersecurity #Android #Phishing

Nuova Campagna di Phishing diffonde malware Android EagleSpy

Una recente campagna di phishing sta diffondendo il malware Android EagleSpy, un potente RAT in grado di rubare dati sensibili attraverso false app bancarie. Analizziamo le somiglianze tecniche con SpyNote e CraxsRAT, rivelando le sofisticate tecniche di offuscamento e il coinvolgimento dello stesso

D3Lab

Campagne #Malware #Italy Week 31

πŸ‘»πŸ”₯πŸ’£β˜ οΈ
#SmokeLoader: Preventivo
#RemcosRAT: Pagamento Bancario
#AgentTesla: Etratto Conto
#Formbook: Ordine
#AsyncRAT: Fattura
#StrRAT: Delivery
#SpyNote - #BingoMod: Malware APK

#mwitaly