On Google Play, two new Android malware families called 'CherryBlos' and 'FakeTrade' were identified, with the intent of stealing cryptocurrency credentials and funds or conducting frauds. Malicious apps are distributed through a variety of means, including social media, phishing websites, and deceptive shopping apps on Google Play, Android's official app store. CherryBlos malware first appeared in April 2023 in the form of an APK (Android package) file disguised as AI tools or coin miners. CherryBlos is a cryptocurrency stealer that utilizes Accessibility service privileges to retrieve configuration files from the C2 server, which automatically authorize new permissions and prevent the user from terminating the trojanized app. CherryBlos employs a variety of methods to obtain cryptocurrency credentials and assets. However, a more intriguing feature extracts text from images and photos stored on the device using OCR (optical character recognition). While taking photos of the recovery phrase is not suggested, some still do it; if this malware is enabled, it may potentially OCR the image and extract the recovery phrase, allowing them to steal the wallet. The malware also acts as a clipboard hijacker, replacing a crypto recipient's address with one controlled by the attacker while the original address appears unchanged to the user, allowing threat actors to redirect payments sent to users to their own wallets, effectively stealing the transferred funds.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...