data theft

AppWizard
July 8, 2025
Google is planning to enhance its Play Protect service by potentially adding scanning capabilities for Progressive Web Apps (PWAs) and WebAPKs during installation to improve user security against malicious threats. Recent code discoveries indicate that Google intends to enable verification for PWAs, as suggested by a code snippet found in the Google Play Store version 46.9.20-31. PWAs can be installed on devices through an "Add to Home screen" option, and when done via Chrome on Android, they receive a WebAPK, which integrates them more deeply into the Android ecosystem. Code snippets hinting at WebAPK scanning have also been uncovered, indicating a response to reports of malicious use of PWAs and WebAPKs for phishing schemes. However, the implementation of these scanning features has not been officially announced, and their availability remains uncertain.
AppWizard
July 5, 2025
Call of Duty: WW2 has been added to Xbox Game Pass, but PC players are cautioned against playing it due to significant risks, including a decline in player engagement and the presence of hackers. Older titles, like WW2, are particularly vulnerable as Activision offers limited support, making them targets for malicious actors. Reports indicate that hackers are exploiting vulnerabilities, such as remote code execution (RCE) exploits, which can lead to unauthorized control over players' machines. Incidents have been reported where players experienced unexpected shutdowns and intrusive pop-ups, including inappropriate content. While no confirmed cases of data theft have emerged, the potential for malware remains a concern. Players are advised to avoid online matches in Call of Duty: WW2 on PC until an official resolution is provided.
AppWizard
July 3, 2025
A sophisticated Android malware campaign named Qwizzserial has emerged as a significant threat to banking security in Central Asia, particularly affecting users in Uzbekistan. Initially identified in mid-2024, it disguises itself as legitimate applications to deceive users into installation. Analysts from Group-IB uncovered it, noting its distribution network resembles the Classiscam fraud infrastructure. The campaign has reportedly infected around 100,000 users, resulting in financial losses exceeding ,000 within three months. The primary distribution channel is Telegram, where cybercriminals pose as government entities. Qwizzserial requests critical permissions upon installation and collects personal and financial information, systematically harvesting existing SMS messages. Recent iterations have incorporated obfuscation techniques and enhanced persistence mechanisms.
AppWizard
June 7, 2025
The latest edition of "Voice of Khurasan" critiques Gem Space, a new social media platform attracting Islamic State Khorasan Province (ISKP) members, highlighting security vulnerabilities. The article warns against migrating from Telegram to Gem Space due to concerns over the platform's closed-source nature, unspecified encryption protocols, lack of end-to-end encryption confirmation, unclear ownership, and absence of transparency reports. It suggests that claims of 40+ million downloads may be exaggerated, pointing to a lack of independent validation of the platform's security. The article emphasizes the importance of informed decision-making regarding digital security.
AppWizard
May 27, 2025
Google's Play Integrity API has been updated as of May 2025 to include stricter security measures that verify app integrity on Android devices. The updated API aims to prevent abuse and protect sensitive information but excludes most custom ROMs, making it challenging for users who root their devices. This change means that many applications, particularly in banking, gaming, and medical services, may become inaccessible to rooted users. The new integrity verdicts—“basic,” “device,” and “strong”—now incorporate hardware-backed security signals, with the “strong” verdict requiring recent security patches. Developers will automatically transition to these stronger verdicts, enhancing security without additional effort. As a result, power users may be locked out of essential applications, and workarounds to bypass these restrictions are becoming less effective.
Search