How a Wormable Android Malware Used to Spread Using WhatsApp Auto-Repliesby@checkpoint

How a Wormable Android Malware Used to Spread Using WhatsApp Auto-Replies

tldt arrow
Read on Terminal Reader

Too Long; Didn't Read

Check Point Research (CPR) recently discovered malware on Google Play hidden in a fake application that is capable of spreading itself via users’ WhatsApp messages. Researchers found the malware hidden within an app called ‘FlixOnline’ The app is a fake service that claims to allow users to view Netflix content from all around the world on their mobiles. If the user downloaded the fake application and unwittingly granted the. appropriate permissions, the malware is capable. of automatically replying to victim’s’ incoming WhatsApp messages with a payload received from a command-and-control (C&C) server.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - How a Wormable Android Malware Used to Spread Using WhatsApp Auto-Replies
Check Point Software HackerNoon profile picture

@checkpoint

Check Point Software

react to story with heart
Check Point Software HackerNoon profile picture
by Check Point Software @checkpoint.Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.
Visit us

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa