paint-brush
How a Wormable Android Malware Used to Spread Using WhatsApp Auto-Repliesby@checkpoint
153 reads

How a Wormable Android Malware Used to Spread Using WhatsApp Auto-Replies

by Check Point Software5mNovember 21st, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Check Point Research (CPR) recently discovered malware on Google Play hidden in a fake application that is capable of spreading itself via users’ WhatsApp messages. Researchers found the malware hidden within an app called ‘FlixOnline’ The app is a fake service that claims to allow users to view Netflix content from all around the world on their mobiles. If the user downloaded the fake application and unwittingly granted the. appropriate permissions, the malware is capable. of automatically replying to victim’s’ incoming WhatsApp messages with a payload received from a command-and-control (C&C) server.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - How a Wormable Android Malware Used to Spread Using WhatsApp Auto-Replies
Check Point Software HackerNoon profile picture
Check Point Software

Check Point Software

@checkpoint

Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.

L O A D I N G
. . . comments & more!

About Author

Check Point Software HackerNoon profile picture
Check Point Software@checkpoint
Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here
Fdn
Koyu
Poast
Thetechstreetnow
13ad
Grimneko
Cutelab
Usethetools
Dkjjk