Malware specializes in spying, says Check Point Research
Surveillance the focus of new malware
Check Point Research recently released an advisory regarding new malware that is specifically tailored to focus on surveillance operations. The malware has been designed to specifically target specific individuals or groups, collecting data from various sources, including emails, contacts, and audio recordings.
What is the purpose of the malware?
The malware’s primary purpose is to collect information about the targeted individuals or groups, potentially for espionage purposes. Once the malware has collected all the necessary data, it is then sent to the command-and-control server where the attackers can analyze and use the information for any nefarious purposes.
How does the malware infect devices?
The malware infects devices by gaining access through phishing emails or fake websites. The malicious code then disguises itself as a legitimate application and proceeds to install itself on the target device without the user’s knowledge.
What can be done to protect against the malware?
To protect against the malware, it is recommended to only download applications from reputable sources and to not click on links from unknown senders. It is also important to keep all software up to date with the latest security patches. If a device has been infected, it is important to immediately disconnect from the internet and seek professional assistance.
Check Point Research has issued an advisory regarding new malware that has been specifically designed to focus on surveillance operations. The malware targets specific individuals or groups, collecting data from various sources and sending it to the command-and-control server for analysis. The malware infects devices through phishing emails or fake websites and disguises itself as a legitimate application. To protect against the malware, it is recommended to only download from reputable sources and keep software up to date. If infected, disconnect from the internet and seek professional assistance.Original Article: https://www.infosecurity-magazine.com/news/north-africa-attacks-stealth/