• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
stealthy kamran spyware targeting urdu speaking users in gilgit baltistan

Stealthy Kamran Spyware Targeting Urdu-speaking Users in Gilgit-Baltistan

You are here: Home / General Cyber Security News / Stealthy Kamran Spyware Targeting Urdu-speaking Users in Gilgit-Baltistan
November 10, 2023

Urdu-talking readers of a regional news web page that caters to the Gilgit-Baltistan area have possible emerged as a focus on of a watering gap attack made to supply a earlier undocumented Android spyware dubbed Kamran.

The campaign, ESET has found, leverages Hunza Information (urdu.hunzanews[.]net), which, when opened on a mobile device, prompts readers of the Urdu variation to install its Android application instantly hosted on the website.

The application, however, incorporates malicious espionage capabilities, with the attack compromising at the very least 20 cell units to date. It has been out there on the web site since someday concerning January 7, and March 21, 2023, all-around when large protests have been held in the area about land rights, taxation, and extensive energy cuts.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The malware, activated upon package deal set up, requests for intrusive permissions, allowing for it to harvest delicate information from the products.

Cybersecurity

This contains contacts, phone logs, calendar activities, location details, files, SMS messages, pictures, record of installed applications, and device metadata. The collected information is subsequently uploaded to a command-and-regulate (C2) server hosted on Firebase.

Kamran lacks remote command abilities and is also simplistic by structure, carrying out its exfiltration routines only when the target opens the app and lacking in provisions to retain monitor of the information that has by now been transmitted.

This means that it frequently sends the exact details, together with any new facts meeting its search standards, to the C2 server. Kamran has nevertheless to be attributed to any recognized risk actor or group.

“As this destructive app has hardly ever been made available by means of the Google Enjoy retail outlet and is downloaded from an unidentified resource referred to as unidentified by Google, to set up this app, the person is asked for to help the option to set up apps from not known resources,” security researcher Lukáš Štefanko said.

Located this write-up appealing? Follow us on Twitter  and LinkedIn to examine far more exceptional information we put up.


Some pieces of this write-up are sourced from:
thehackernews.com

Previous Post: «zero day alert: lace tempest exploits sysaid it support software vulnerability Zero-Day Alert: Lace Tempest Exploits SysAid IT Support Software Vulnerability
Next Post: Iran-Linked Imperial Kitten Cyber Group Targeting Middle East’s Tech Sectors iran linked imperial kitten cyber group targeting middle east's tech sectors»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.