surveillance

AppWizard
May 11, 2026
28 Android applications were removed from the Google Play Store after being identified as scams by security researchers at ESET. These apps, part of a campaign called “CallPhantom,” falsely claimed to provide access to private call logs, SMS records, and WhatsApp activity. They attracted millions of downloads despite lacking legitimacy, offering fabricated data such as fake phone numbers and bogus call durations. Some apps charged users for “detailed reports” that either never arrived or contained nonsensical information. The apps did not steal phone data or install malware but instead promised illicit access and generated fictitious data. The primary targets of this scam were users in India and the Asia-Pacific region.
AppWizard
May 10, 2026
The Blackberry Messenger (BBM) application has re-emerged in terror-related networks in Jammu and Kashmir, as revealed by the interrogation of an operative from Lashkar-e-Taiba (LeT). The Srinagar Police recently dismantled an LeT module, arresting Abdullah (Abu Hureira) and others. The National Investigation Agency (NIA) is now investigating, focusing on BBM and other messaging apps used for coordination. BBM has a history of scrutiny, with the Indian government previously threatening a ban unless servers were established in India. In 2019, BBM became a paid service for corporate users. Investigators are tracking BBM Enterprise accounts linked to terrorism. Cybersecurity concerns persist in Jammu and Kashmir, especially regarding privacy-centric apps like Threema and banned applications like Element, which are believed to aid terror groups in evading surveillance. Other apps, such as Dust, face scrutiny for their ephemeral messaging features. The increased internet access has also allowed terrorist organizations to strengthen their networks, with some individuals posing as extreme nationalists having ties to radical groups.
AppWizard
May 10, 2026
Srinagar has seen a resurgence of the Blackberry Messenger (BBM) application within the Lashkar-e-Taiba (LeT) terror network, as revealed by the interrogation of a key operative. The Srinagar police recently dismantled an LeT module, arresting Abdullah (Abu Hureira) and others, prompting the National Investigation Agency (NIA) to investigate. During questioning, it was disclosed that various communication apps, including BBM, Element, Threema, and Dust, were being used alongside mainstream platforms like WhatsApp and Telegram. BBM was initially flagged by investigative agencies in 2009, leading to the establishment of servers in India in 2011-12 after the Indian government threatened a ban. However, BBM transitioned to a paid service in 2019, and investigators are now tracing accounts linked to terrorist activities. The Indian government banned 14 messaging applications in May 2023, including Element, due to their use by terror groups. Highly secure apps like Threema and ephemeral messaging platforms like Dust are under scrutiny for their potential to hinder intelligence gathering. The rise of the internet has facilitated communication for terrorist organizations, with the UN highlighting their exploitation of online platforms for propaganda and recruitment, leading to the adoption of Resolution 2354 in 2017 to combat terrorism online.
BetaBeacon
May 5, 2026
ScarCruft compromised a video game platform in a supply chain attack, trojanizing its components with a backdoor called BirdCall to target ethnic Koreans residing in China. The attack enabled the threat actors to target both Windows and Android devices, turning it into a multi-platform threat. The campaign targeted sqgame[.]net, a gaming platform used by ethnic Koreans in China, known as a transit point for North Korean defectors. BirdCall has features like screenshot capture, keystroke logging, and data gathering, and relies on legitimate cloud services for command-and-control. The Android variant collects various data and has seen active development.
AppWizard
May 5, 2026
A North Korean hacking group has targeted a digital gaming platform popular among the Korean ethnic enclave in China, using a sophisticated strategy to infiltrate Android applications. Researchers from Eset discovered that an app on the platform contained a backdoor known as BirdCall, linked to North Korea. The official website for the gaming platform hosted the same suspicious APK file. A second Android file associated with another game on the same site was also found to contain the BirdCall backdoor. This supply-chain attack was attributed to the threat actor ScarCruft (APT37), active in Asia and extending into Europe and the Middle East since late 2024. The hackers likely compromised the web server to recompile original APKs with the backdoor, which can collect sensitive information such as contacts, SMS messages, call logs, documents, media files, and private keys, and can take screenshots and record audio. The malware disguises its command and control traffic among regular internet traffic, primarily using Zoho WorkDrive for operations.
AppWizard
April 27, 2026
The privacy-centric period tracking app, Periodical, will not comply with Google's new developer verification policy requiring app developers to submit government-issued identification. As a result, the developers have decided to withdraw from the official Android ecosystem, raising concerns about user privacy and access to reproductive health tools. Periodical is praised for storing data locally without third-party trackers, which is crucial given the risk of law enforcement accessing digital health data. Users are uncertain about the app's future and are being directed to its GitHub repository for updates, as the new policy will complicate the installation of unverified apps. Users will need to enable Developer Options and navigate complex settings to sideload the app, which may deter many from tracking their menstrual cycles.
AppWizard
April 27, 2026
Signal is experiencing a crisis of trust due to security breaches, including successful infiltrations by Russian hackers in Germany and the Netherlands. Senior EU officials have disbanded a Signal group due to hacking fears. Accessing Signal chat content on the dark web can cost between ,000 to ,000, while WhatsApp data is cheaper, ranging from ,000 to ,000. Personal information, such as travel histories, can be bought for 0 to 0, especially for individuals who have traveled to countries known for data leaks. Investigations revealed that Russian diplomats' medical records, banking information, and dating site usernames are available on the black market. Location tracking can be precise when certain applications are downloaded. A Kazakh refugee in Brussels faced high-definition surveillance, and local laws challenge private detectives' effectiveness. State actors have used Israeli spyware like Pegasus to target journalists and adversaries. The prospect of secure communication is diminishing, with online exchanges increasingly seen as vulnerable.
Search