Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      Agent Smith es un malware de Android que infecta y sustituye apps

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

      Android tiene un nuevo malware que se distribuye de manera silenciosa, infectando y sustituyendo apps que tienen como fin el robo de datos.

      El agente Smith es un nombre conocido para muchos que disfrutaron Matrix hace más de 20 años. Hoy toma relevancia ya que así se ha nombrado a un nuevo malware de Android que se comporta de manera similar a como lo hizo el personaje interpretado por Hugo Weaving.

      De acuerdo con la empresa de seguridad Check Point, Agent Smith ha infectado alrededor de 25 millones de dispositivos Android. El malware se disfraza como una aplicación relacionada con Google y reemplaza otras aplicaciones instaladas con versiones maliciosas que cuentan con código propio.

      Agent Smith sustituye aplicaciones como WhatsApp de manera silenciosa

      Los investigadores de Check Point indican que Agent Smith explota la vulnerabilidad de Android conocida como Janus, que permite inyectar malware a las aplicaciones del móvil saltándose un proceso de verificación que compara la firma anterior con la nueva, todo esto de manera silenciosa sin que el usuario pueda darse cuenta.

      Una de las características de este malware es que muestra anuncios fraudulentos que podrían derivar en un robo de datos del dueño del móvil, como información personal y bancaria. El hecho de atacar y sustituir las aplicaciones instaladas vuelve compleja la tarea de que el usuario pueda combatirlo por su cuenta, por lo que una de las formas de defenderse ante una posible infección es no instalar aplicaciones de fuentes que no sean confiables.

      Agent Smith ha afectado a más de 25 millones de usuarios, principalmente en India, donde contabiliza 15 millones de dispositivos. El malware se ha extendido a otros países como Pakistán y Bangladesh, aunque también se han reportado casos en Reino Unido y Estados Unidos.

      La presencia de Agent Smith no es nueva, de hecho se tiene registro desde principios de 2016 cuando apareció en 9Apps, uno de los canales de descarga de aplicaciones más populares de Asia. El malware se ha mantenido vigente durante todo ese tiempo, incluso infectando algunas aplicaciones de la Play Store.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Dash
          This is an Android Spyware App, Which uploads user data such as Contacts, Messages, Call log & recordings, Send messages, Photos, Videos, etc.
          The application is installed on the child's device as well as on the parent's device, in the login view the type of user is chosen.
          Features
              Multiple Child clients
              Hidden app icon (stealth mode)
              Real-time location.
              Recording calls: incoming/outgoing.
              SMS: received/sent.
              Environment recording.
              Take pictures.
              Keylogger.
              Phishing social network.
              Notifications received: Whatsapp, Instagram, Messenger.
          Disclaimer
          The Dash application is intended for legal and educational purposes ONLY. It is a violation of the law to install surveillance software on a mobile phone that you have no right to monitor.
          Dash is not responsible if the user does not follow the laws of the country and goes against it. If it is found that the user violates any law or spy in secret, he will be subject to sanctions that govern the legislation of the country.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Malware Scanner will help you to scan your website with one simple click. It can find both known and unknown viruses, shells, malware, malicious code infections and other website threats.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          So you’ve built an Android app, and you’re ready to share it with the world. Now what? There are many ways you can distribute your app, and in this course, Jon-Luke West shows you how to use the primary distribution channel, the Google Play Store, as well as the Amazon Appstore. Jon-Luke covers how to prepare the app for distribution by cleaning up and optimizing the code, creating a security certificate, and uploading an APK file. He then shows how to create multiple flavors of your app to include different features, how to register as a Google Play and Amazon developer, set the app description and pricing, and publish the app. Lastly, Jon-Luke looks at the post-publishing aspects, including how to track app usage, usage statistics, revenue, and crash reporting.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          Are you a pen tester having some experience with Metasploit or Empire frameworks? Or maybe you take your first steps as an ethical hacker and you want to know more about how all these offensive tools work? Or you are a blue teamer or threat hunter who needs to better understand the internal workings of malware?
          This course will provide you the answers you’re looking for. It will teach you how to develop your own custom malware for latest Microsoft Windows 10. And by custom malware we mean building a dropper for any payload you want (Metasploit meterpreter, Empire or Cobalt Strike beacons, etc.), injecting your shellcodes into remote processes, creating trojan horses (backdooring existing software) and bypassing Windows Defender AV.
          You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.
          You Will Learn
              What is malware development
              What is PE file structure
              Where to store your payload inside PE
              How to encode and encrypt payloads
              How and why obfuscate function calls
              How to backdoor programs
              How to inject your code into remote processes
          Target Audience
              Ethical Hackers
              Penetration Testers
              Blue Teamers
              Threat Hunters
              All security engineers/professionals wanting to learn advanced offensive tactics
          Requirements
              Understanding of operating system architecture
              Some experience with Windows OS
              Basic knowledge about C and Intel assembly
              Computer with min. 4 GB of RAM + 30 GB of free disk space
              VirtualBox 6.0+ installed
              Strong will to learn and having fun
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.