Android malware SpyAgent steals private keys from screenshots and images

This article is machine translated
Show original

A new Android malware, dubbed SpyAgent, discovered by security firm McAfee, is capable of stealing private keys stored in screenshots and images on a smartphone's memory.

Specifically, the malware uses optical character recognition (OCR) technology to scan and extract text from images stored on the device. OCR is a popular technology on many platforms, including desktop computers, capable of recognizing, copying and pasting text from images.

McAfee Labs said SpyAgent spreads through malicious links sent via text messages. The process begins when a user accidentally clicks on the link they receive.

The link takes users to a seemingly legitimate website and asks them to download an app that is advertised as safe. However, it is actually the SpyAgent malware, and installing the app will compromise the phone.

These malicious programs are reportedly disguised as banking apps, streaming services, or government agency apps. Once installed, the apps request access to contacts, messages, and local storage.

Currently, SpyAgent mainly targets Korean users and has been detected in over 280 different fraudulent apps.

Last August, a similar malware affecting the MacOS operating system, called “Cthulhu Stealer,” was discovered. Like SpyAgent, Cthulhu Stealer masquerades as legitimate software and steals personal information, including MetaMask passwords, IP addresses, and Cold Storage private keys.

In the same month, Microsoft also discovered a security vulnerability in the Google Chrome browser, which was allegedly exploited by a North Korean hacker group called Citrine Sleet.

The hacker group is believed to have created fake cryptocurrency exchanges and sent fraudulent job applications to users. Those who Watcher the process unwittingly installed malware, allowing the hackers to remotely control and steal their private keys.

Although the Chrome vulnerability has been patched, the increase in malware attacks has forced the US Federal Bureau of Investigation (FBI) to issue a warning about this North Korean hacker group.

Join Telegram: https://t.me/tapchibitcoinvn

Follow Twitter: https://twitter.com/tapchibtc_io

Follow Tiktok: https://www.tiktok.com/@tapchibitcoin

Stone Sanh

According to Cointelegraph

Source
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments