Google's security group has recently reported a series of problems that could lead to spyware attacks on Android smartphones. At least five "zero-day vulnerabilities" have been identified that could be used to install spyware called Predator. Google's own Threat Analysis Group (TAG) has identified multiple threats that may have occurred from various locations.

 

It is thought that the Predator spyware may have been backed by a commercial company called Cytrox, which is used for surveillance.

 

Google warns about Predator Spyware attacking Android smartphones

 

According to TAG (Threat Analysis Group, Google), the raids took place between August 2021 and October 2021. In that case, the attackers installed spyware on Chrome OS and Android platforms using zero-day exploits. Even all the updated Android phones with the latest security patches are under this attack.

 

According to the sources, Cytrox is believed to have sold spyware to state-sponsored cyber-attackers. According to TAG, there were attacks from several countries last year. This includes Egypt, Madagascar, Siberia, Spain, and Indonesia.

 

 

Usually, the names of these countries do not come up in the case of cyber aggression. But TAG's investigative report says that the governments of these countries have been monitoring individuals using this spyware. In the recent past, there has been a worldwide outcry over the Pegasus created by the NSO Group, which has once again been accused of using this spyware on behalf of the state. Predator also has all those impressions.

 

 

The report further states that in the early stages of the attack, the device was infected with spyware by sending one-time access URLs via e-mail. When a person enters that link, he or she is immediately taken away by the attacker's domain, but only for a few seconds. However, at that time, before the user understands anything, spyware is downloaded to his smartphone. The user is then returned to the original website.

 

TAG claims that this spyware is not the primary purpose of attacking the phones of billions of people. Rather, it is aimed at monitoring individuals or groups.

 

Have a question? Or, a comment? Let's Discuss it below...

Thank you for visiting our website!

We value your engagement and would love to hear your thoughts. Don't forget to leave a comment below to share your feedback, opinions, or questions.

We believe in fostering an interactive and inclusive community, and your comments play a crucial role in creating that environment.