StrongPity’s backdoor is fitted with varied spying options and might file cellphone calls, gather texts, and collect name logs and phone lists
This week, the ESET analysis crew printed their findings about an espionage marketing campaign by the StrongPity APT group that spreads a totally useful, however trojanized model of the respectable Telegram app for Android. The malicious app – which has varied spying options, together with recording cellphone calls and gathering SMS messages – is distributed through a copycat web site that mimics Shagle, an grownup video-chat service. By no means heard about Shagle? Watch the video to study extra not simply in regards to the platform, however particularly in regards to the StrongPity assaults and its targets and ways.
For a full technical write-up, head over right here: StrongPity espionage marketing campaign focusing on Android customers.