device location

AppWizard
March 17, 2025
A spyware known as KoSpy, linked to North Korean hacking groups APT37 and APT43, was found disguised as a File Manager app on the Google Play Store. This malicious app accessed private data such as text messages, call logs, device location, stored files, and user keystrokes. It could also gather Wi-Fi network details, list installed applications, and record audio, capture images, and take screenshots without user awareness. The app was downloaded approximately a dozen times before Google removed it after security researchers raised concerns. Google Play Protect and additional security measures from smartphone manufacturers help protect Android devices from such threats. Users are advised to scrutinize app permissions and download apps from official sources to minimize risks.
AppWizard
March 12, 2025
Malware, specifically a new spyware variant called KoSpy, has been linked to a North Korean hacking group known as ScarCruft (APT37). Researchers at Lookout Threat Lab discovered KoSpy concealed within deceptive applications like file managers and security software. Once installed, it can extract sensitive information such as SMS messages, call logs, device location, and access files. It can also record audio and video, capture screenshots, and log keystrokes. The data collected is transmitted to Command and Control servers encrypted with a hardcoded AES key and utilizes Firebase Firestore for configuration data. At least one malicious application associated with KoSpy was found on the Google Play Store, downloaded over ten times, and similar apps were also on third-party app store APKPure. Google has since removed the identified applications and deactivated the related Firebase projects.
AppWizard
March 12, 2025
A report from cybersecurity firm Lookout reveals that North Korean hackers have uploaded Android spyware, named KoSpy, onto the Google Play app store, which has been downloaded over ten times. The spyware masquerades as a file manager and is designed for surveillance, collecting data such as SMS messages, call logs, device location, files, keystrokes, Wi-Fi details, installed apps, audio recordings, images, and screenshots. Google has removed the identified apps from the Play Store and deactivated associated Firebase projects. Lookout also found instances of KoSpy on the third-party app store APKPure. The campaign appears targeted at individuals in South Korea who speak English or Korean, with links to North Korean hacking groups APT37 and APT43.
Winsage
February 15, 2025
Microsoft has begun deprecating certain features in Windows 11 in 2025, starting with the Location History feature, which has been used to collect and store location data for users. The Location History feature will be removed from the latest preview build for Dev and Beta insiders, meaning that location data will no longer be saved locally, and the corresponding settings will be removed from the Privacy & Security > Location page in Settings. Other recently deprecated features include Suggested Actions, Paint3D, and Legacy DRM services.
AppWizard
November 7, 2024
Twelve malicious Android applications have been identified that can take control of devices to record audio and perform other harmful activities. These apps include: 1. Rafaqat 2. Privee Talk 3. MeetMe 4. Let’s Chat 5. Quick Chat 6. Chit Chat 7. YohooTalk 8. TikTalk 9. Hello Cha 10. Nidus 11. GlowChat 12. Wave Chat The first six were available on the Google Play Store and were downloaded over 1,400 times before removal. Users are advised to uninstall these apps immediately and remain cautious about downloading unfamiliar applications or clicking on suspicious links.
Winsage
September 23, 2024
Microsoft will deprecate Windows Server Update Services (WSUS) with the release of Windows Server 2025, as part of an initiative to streamline server functionalities. Other features being removed include: - IIS 6 Management Console - WordPad - SMTP Server - Windows PowerShell 2.0 Engine Additionally, several functionalities will cease to be actively developed, including: - Computer Browser service - NTLM protocols (LANMAN, NTLMv1, NTLMv2) - Remote Mailslots - TLS versions 1.0 and 1.1 - WebDAV Redirector service - WMIC tool Organizations using WSUS will need to find alternative solutions, aligning with Microsoft's cloud-first strategy.
Search