screen capture

AppWizard
February 27, 2026
Google has released Android 17 Beta 2, which includes features aimed at enhancing user privacy. The update introduces a limited-access contacts picker that allows apps to access specific contacts based on user-selected data fields, employing a temporary, session-based read access model. This reduces the need for broad READ_CONTACTS permissions and allows users to choose which contacts to share. Additionally, the EyeDropper API is introduced, enabling apps to collect display color data without requiring screen capture permissions, thus enhancing security. Both features are designed to give users greater control over their personal information.
AppWizard
February 27, 2026
Android 17 Beta 2 is now available for developers, introducing new features and bug fixes, including solutions for spontaneous reboots and interface freezes. Key features include the ability to create floating app bubbles, Cross-device app Handoff for seamless task continuation across devices, a new system-level contact picker for temporary read-only access to contacts, expanded SMS OTP protection, and enhanced local network privacy. The update also includes an EyeDropper API for color requests without needing screen capture permissions. Enrollment in the Android Beta Program is required for Pixel device users to access the update, which is rolling out via OTA, with options for sideloading or manual flashing. The stable release of Android 17 is expected in mid-2026.
AppWizard
February 19, 2026
Cybersecurity researchers have identified a new Android trojan named Massiv, designed for device takeover attacks targeting financial theft. It disguises itself as IPTV applications and poses risks to mobile banking users by allowing operators to remotely control infected devices for fraudulent transactions. The malware was first detected in campaigns targeting users in Portugal and Greece, with features including screen streaming, keylogging, SMS interception, and fake overlays for credential theft. One campaign specifically targeted the gov.pt application to deceive users into providing sensitive information. Massiv can execute various malicious actions, such as altering device settings, sending device information, and downloading malicious files. It is distributed through dropper applications that mimic IPTV services, often via SMS phishing. The malware operates in the background while the dropper appears as a legitimate app. Recent campaigns have focused on regions like Spain, Portugal, France, and Turkey, indicating a growing threat landscape. The operators of Massiv are developing it further, suggesting intentions to offer it as a Malware-as-a-Service.
AppWizard
February 19, 2026
Massiv is an Android banking Trojan that disguises itself as legitimate applications, primarily targeting users in southern Europe. It is distributed through side-loading and is capable of remote control over infected devices, enabling Device Takeover attacks that can lead to unauthorized banking transactions. Massiv often masquerades as IPTV applications to attract users seeking online television services. The malware employs overlay functionality to create deceptive screens, keylogging to capture sensitive information, and SMS/Push message interception. It can monitor applications on infected devices and present fake overlays to prompt users for sensitive data. Notably, it has targeted the Portuguese government application gov.pt and connects with Chave Móvel Digital, a digital authentication system, to access victims' banking accounts. Once it captures sensitive data, Massiv allows operators remote access to the device using Android’s AccessibilityService, facilitating real-time observation and manipulation of the user interface. It communicates over a WebSocket channel and supports screen streaming and UI-tree modes for enhanced control. Massiv's distribution includes malware droppers that initially do not contain malicious code but open a WebView to an IPTV website while the actual malware operates in the background. This tactic has increased in recent months, particularly in Spain, Portugal, France, and Turkey. Indicators of compromise include specific SHA-256 hashes and package names associated with the malware. The bot commands allow operators to perform various actions on the infected device, such as clicking coordinates, installing APKs, and showing overlays.
Winsage
December 11, 2025
ShareX is a versatile screen capture tool that offers various image capture methods, including capturing the entire screen, a specific window, or a designated region, and it can also record videos. It includes powerful editing tools that allow users to add shapes and text, crop areas, incorporate emoji stickers, and blur or pixelate sensitive information. ShareX enables direct uploads to third-party platforms like Google Drive and Imgur, enhancing productivity for visual communication.
Tech Optimizer
December 9, 2025
The author created a custom reverse TCP payload using Python, packaged it into an .elf executable, and tested its stealthiness against antivirus software. The payload included functionalities such as webcam snapshots, keylogging, screen capture, and file transfers. Established tools for obfuscation often triggered antivirus alerts, prompting the author to develop a custom solution to avoid signature-based detection, maintain behavioral control, and gain insights into detection engines. The payload was designed to connect back to the attacker's machine and execute commands, while the listener processed incoming data. After compiling the binary, it was submitted to VirusTotal, where only four out of 64 antivirus engines flagged it, indicating that custom code can bypass many next-gen antivirus products.
Tech Optimizer
November 14, 2025
A recent malware campaign has seen attackers disguising the DarkComet remote access trojan as Bitcoin-related applications to target cryptocurrency users. DarkComet RAT allows attackers to gain extensive control over compromised systems, despite its original creator discontinuing it years ago. The malware features capabilities such as keystroke logging, file theft, webcam surveillance, and remote desktop control, posing significant risks to users. The malicious file was distributed as a compressed RAR archive named “94k BTC wallet.exe,” which helps evade email filters. Security analysts at Point Wild discovered that the malware ensures persistence by copying itself to %AppData%RoamingMSDCSCexplorer.exe and creating a registry key for automatic execution at system startup. It attempts to connect to a command-and-control server at kvejo991.ddns.net over TCP port 1604. The malware injects its payload into legitimate Windows processes to perform keylogging and screen capture while remaining undetected. Captured keystrokes are stored in log files and exfiltrated through the command-and-control channel. Users are advised to avoid downloading cryptocurrency tools from untrusted sources and to keep security software updated.
Winsage
November 13, 2025
Windows 11 includes the Snipping Tool for screen capture, but ShareX offers more advanced features. ShareX allows users to capture the entire screen, a specific window, or a designated region, and it can also record videos. It includes a suite of editing tools that enable users to add shapes and text, crop images, incorporate emoji stickers, and blur or pixelate sensitive information. After editing, ShareX allows users to upload their content to third-party platforms like Google Drive and Imgur directly from the app.
Search