Researchers have found a backdoored Pokémon GO Android app in circulation via unofficial channels. The infected apk contains a malicious remote access tool called DroidJack/SandroRAT. The tool can give the remote attacker full control over the infected phone. The research also features the SHA256 of the legitimate apk and the backdoored apk, so users can check if their app is compromised or safe.
Subscribe to:
Post Comments (Atom)
Featured Post
Hackers Exploiting ProxyLogon and ProxyShell Flaws in Spam Campaigns
Threat actors are exploiting ProxyLogon and ProxyShell exploits in unpatched Microsoft Exchange Servers as part of an ongoing spam campaign
Popular Posts
-
Threat actors are exploiting ProxyLogon and ProxyShell exploits in unpatched Microsoft Exchange Servers as part of an ongoing spam campaign
-
Following the release of iOS 10.3.2 on May 15, Apple has stopped signing iOS 10.3.1, the previous version of iOS that was available to consu...
No comments:
Post a Comment