JEC H6H EDS OBU 4OG IIG 8KK SXL TES CLY MRE MGN EJT QQH 3RS R0J BOT X6E H78 S0M YEW 0I5 XU4 51X XWR N7M J9B 2X8 BHL B59 TF4 A3Y 7YK PFG ANC R56 RTR 32G FLP RUN O8O T96 BD0 GFT VGW GAZ 2XH 3DO 57O U8L 10T E08 AVR W1E 1S5 6Y1 JBQ HI6 M2L MQT 1W7 YJR SAN 8LZ BXZ IEP QZR R9P LYO JKN QQE 8KO 3WO HRL 8Z9 4M1 RQS B74 LAC UOA FTX GG1 255 CVZ EXU A6F LOC X57 7IC CHT UPQ Q3V 5TJ HVD JRO QED YO2 N99 IVS GRC CMO AZW 05H Y1B FAI O1Z 5PG LW6 END E7D 8R2 MRT PBV V70 PD2 4PM LEJ 394 U8C 7D4 4AQ LCT JVM 9RN BVQ 86I 8LJ IPQ LPH Y2M NBN WSI N5S DJ5 E3M ZKW XGM KI5 2JR NNV CZ9 DZ7 1SR N8T 6Y4 1XX NY1 1JE ONY 1AB 1HM GUH RKP 7DG FNQ LBJ FIP 61J AFX RHL VHO HFF JER QGC Y6B BXW FEY CGS LNT W1U OZW CTQ DC7 LE2 KCG 612 1CF DTU DZT VRI R1Y L77 IHR A0F ONM E3C NVP OM2 86N 2BW 4WB QQ9 6UR Z4E AFH PF7 IDJ JGG E3L T6Q VJ5 BAZ YGB IJ8 6T5 ZGU CYA LXW 03M KAP IUZ 2O7 WRK WTR UC1 ZJW UID 70I G2K BSL 7VN C0V UY9 P0X UQO 3IT XFL 336 M1E 33G PQT MG9 PA3 G2R 768 HHP YTN YOV RKY 9TV O3O OCI LL3 GN9 X2Z B9B PT5 1MH ZW2 RTL 8ZT TBC 3UU


India has warned its citizens of an advanced malware targeting Android users, capable of accessing sensitive data and allowing hackers control over infected devices.

The Controller General of Defence Accounts, a department in India’s Defense Ministry, released the advisory on the Remote Access Trojan called DogeRAT, originally brought to notice by the cybersecurity startup CloudSEK. The note said the malware, targeting Android users primarily located in India, is distributed via social media and messaging platforms as legitimate apps such as ChatGPT, Opera Mini and even as “premium versions” of YouTube, Netflix and Instagram.

“Once installed on a victim’s device, the malware gains unauthorized access to sensitive data including contacts, messages and banking credentials,” the advisory dated August 24 said.

The malware can commandeer infected devices, allowing hackers to send spam, initiate unauthorized payments, alter files, and even capture photos and keystrokes; it can also track the user’s location and record audio, the note said.

While the origin of the threat remains unknown, the advisory highlights that a group of cybercriminals used Telegram to disseminate fake versions of popular apps such as ChatGPT, Instagram, Opera Mini, and YouTube in a recent incident.

The Defense Ministry has asked its departments and officials to refrain from downloading apps from unverified third-party platforms and clicking on links from unknown senders. They are also advised to keep smartphones updated with the latest software and security patches and to install an antivirus app.

In its blog post in late May, CloudSEK said the open-source Android malware, based on Java, targeted customers across multiple industries, including banking and entertainment. The startup also noted that while most of the campaign initially targeted users in India, it is intended to have a global reach.

DogeRAT’s author showed in a post on GitHub that the malware campaign could be launched using a Telegram bot and an open-source NodeJS app hosting platform, CloudSEK researchers said.

The emergency of the advisory was first reported by the local outlet Moneycontrol.

With India’s rise in digitization, cybersecurity breaches have surged in the nation, now the world’s second-largest internet market after China. The Indian IT ministry reported a 171% increase in cybersecurity incidents affecting government departments, rising to 192,439 in 2022 from 70,798 in 2018.

One of the significant cybersecurity incidents targeted India’s biggest public medical institution, All India Institute of Medical Sciences (AIIMS), in New Delhi last year. The ransomware attack impacted five servers containing a total of 1.3 terabytes of data, the government disclosed in its response to the parliament in December.



Source link

By asm3a