A new #SpyNote report is out! ๐Ÿšจ Dive into the tactics of this Android RAT campaign, from dynamic payload decryption to new obfuscation methods. Learn how threat actors are using deceptive Google Play Store clones to target users:

https://dti.domaintools.com/spynote-malware-part-2/

๐Ÿค– Android devices can be a major cybersecurity hazard for businesses. See how #ANYRUN helps detect #malicious files early, accelerate investigations, and improve threat response.

Analysis of #SalvadorStealer and #SpyNote inside๐Ÿ‘‡
https://any.run/cybersecurity-blog/how-android-malware-targets-businesses/?utm_source=mastodon&utm_medium=post&utm_campaign=android_targets_business&utm_term=160725&utm_content=linktoblog

#infosec #cybersecurity

Why Businesses Are at Risk of Android Malware Attacks

Discover how Android apps compromise businessesโ€™ security and learn about the power of sandbox analysis for early detection of cyber threats.

ANY.RUN's Cybersecurity Blog

๐Ÿšจ Newly Registered Domains Distributing SpyNote Malware

The latest DomainTools Investigations (DTI) analysis reveals that deceptive websites hosted on newly registered domains are being used to deliver the potent AndroidOS SpyNote malware. These sites mimic the Google Chrome install page on the Google Play Store to lure victims into downloading SpyNote, a powerful Android remote access trojan (RAT) used for surveillance, data exfiltration, and remote control.

๐Ÿ” Key Findings:

๐Ÿ”ทDeceptive Techniques: Websites mimic popular app installation pages to trick users.
๐Ÿ”ทDomain Patterns: Common patterns in domain registration and website structure.
๐Ÿ”ทLanguage Indicators: Mix of English and Chinese-language delivery sites.
๐Ÿ”ทMalware Capabilities: Extensive surveillance, data theft, and remote control functionalities.

SpyNote's sophisticated capabilities make it a significant threat to individuals and organizations. It can steal sensitive data, activate cameras and microphones, manipulate calls, and even remotely wipe or lock devices. The malware's persistence often requires a factory reset for complete removal.

Check out the full analysis here: https://dti.domaintools.com/newly-registered-domains-distributing-spynote-malware/?utm_source=Mastodon&utm_medium=Social&utm_campaign=SpyNote-GooglePlayStore

#SpyNote #Malware #ThreatIntelligence #CyberSecurity #InfoSec

Newly Registered Domains Distributing SpyNote Malware - DomainTools Investigations | DTI

Deceptive websites hosted on newly registered domains are being used to deliver AndroidOS SpyNote malware. These sites mimic the Google Chrome install page on the Google Play Store.

DomainTools Investigations | DTI

๐ŸŒ Campagne #Malware in Italia - Week 49

๐Ÿ“ž #APK Bank
๐Ÿ•ต๏ธโ€โ™‚๏ธ #SpyNote / #Antidot / #Irata / #DroidBot / #SmSSpy
โœ‰๏ธ Email Campaigns
๐Ÿ’ผ #Formbook: Preventivo
๐Ÿ“ฆ #AgentTesla: Spedizione
๐Ÿ“‘ #Remcos: Fattura
๐Ÿ’ฐ #GuLoader: Pagamento
๐Ÿงพ #XWorm: Fattura
๐Ÿ #SnakeKeyLogger: Bonifico
๐Ÿ”– #Lokibot: Prezzo
ยฉ๏ธ #Rhadamanthys: Copyright
๐Ÿ“„ #VipKeyLoggerL: Documento

๐Ÿ“ข Resta vigile! ๐Ÿšจ

#mwitaly #CyberSecurity #StaySafe

๐Ÿ“ข Campagne #Malware in Italia โ€“ Week 48

๐Ÿ” Minacce rilevate:
#Formbook โ€“ ๐Ÿ’ฐ Prezzi e Ordini
#SpyNote / #Irata โ€“ ๐Ÿ“ฑ APK Bank
#SnakeKeyLogger โ€“ ๐Ÿค‘ Acquisti
#AsyncRAT โ€“ โ›“๏ธโ€๐Ÿ’ฅ Copyright
#XWorm โ€“ ๐Ÿงพ Fattura
#VipKeyLogger โ€“ ๐ŸŽ Offerta
#AgentTesla โ€“ ๐Ÿšš Spedizione

๐Ÿ“Œ #Malware #Italy #mwitaly

๐Ÿ“ข Campagne #Malware in Italia โ€“ Week 47

๐Ÿ” Minacce rilevate:
#SpyNote / #Irata โ€“ ๐Ÿ“ฑ APK Bank
#Remcos โ€“ ๐Ÿ’ณ Pagamento Bancario
#XWorm โ€“ ๐Ÿงพ Fattura
#VipKeyLogger โ€“ ๐ŸŽ Offerta
#SnakeKeyLogger โ€“ ๐Ÿ“ฆ Ordine
#Vidar โ€“ ๐Ÿ“ฉ Fattura via PEC
#Formbook โ€“ ๐Ÿ’ฐ Prezzi
#AgentTesla โ€“ ๐Ÿšš Spedizione
#Lumma โ€“ โš–๏ธ Copyright

๐Ÿ“Œ #Malware #Italy #mwitaly

๐ŸŽƒ Campagne #Malware #Italy Week 43 ๐ŸŽƒ

๐Ÿ•ต๐Ÿปโ€โ™‚๏ธ #SpyNote / #EagleSpy: APK Bank
๐Ÿ’ฐ #Remcos: Pagamento Bancario
๐Ÿ #SnakeKeyLogger: Ordine
๐Ÿ“ง PureLogs: Posta Certificata
๐Ÿจ #AgentTesla: Booking
๐Ÿ“„ #XWorm: Fattura
๐Ÿ“ฆ #NjRat: Spedizione
๐Ÿšš #Guloader: DHL

#mwitaly

Campagne #Malware #Italy Week 41

โ˜ ๏ธ๐Ÿ”ฅ๐Ÿ’ฃ๐Ÿ‘ป

#SpyNote: APK Bank
#Formbook: Estratto Conto
#SnakeKeyLogger: Pagamento Swife
#AgentTesla: Booking
#Remcos: Richiesta Prezzi
#XWorm: Fattura Google

#mwitaly

๐Ÿšจ Nuova campagna di phishing bancario diffonde il #malware Android #EagleSpy!

Questa minaccia, simile a #CraxsRAT e #SpyNote, ruba dati sensibili dai dispositivi Android.

Scopri di piรน e proteggi il tuo smartphone!

๐Ÿ‘‰ https://www.d3lab.net/nuova-campagna-di-phishing-diffonde-malware-android-eaglespy/

#Cybersecurity #Android #Phishing

Nuova Campagna di Phishing diffonde malware Android EagleSpy

Una recente campagna di phishing sta diffondendo il malware Android EagleSpy, un potente RAT in grado di rubare dati sensibili attraverso false app bancarie. Analizziamo le somiglianze tecniche con SpyNote e CraxsRAT, rivelando le sofisticate tecniche di offuscamento e il coinvolgimento dello stesso

D3Lab

Campagne #Malware #Italy Week 31

๐Ÿ‘ป๐Ÿ”ฅ๐Ÿ’ฃโ˜ ๏ธ
#SmokeLoader: Preventivo
#RemcosRAT: Pagamento Bancario
#AgentTesla: Etratto Conto
#Formbook: Ordine
#AsyncRAT: Fattura
#StrRAT: Delivery
#SpyNote - #BingoMod: Malware APK

#mwitaly