For years there has been an application on Android and iOS that steals contacts, pictures and more information from our phones!

Working on iOS gives us a safe ecosystem, although sometimes we're not immune to some applications that can steal information from our devices. A group of security experts this time discovered an application that collects data from users on Android and iOS after it has been able to bypass the security measures imposed in the App Store to avoid these phishing applications.
 
application on Android and iOS that steals contacts, pictures and more information from our phones!
 
It was Lookout for the security of mobile devices that launched the alarm against the application of Spyware Exodus, which was hidden in real applications that had sneaked into the Google Play store without any problem for months or even years.
These malware have been directly linked to the Italian government, and for this reason, at first, there are only those affected in Italy. Apps that have been integrated with these malware are to improve mobile phone performance. With this camouflage, you can access up to 1000 mobile phones where your personal data has been stolen such as history, calendars, locations or calls.
But this was not only in the Android system, but also jumped into iOS. . On iOS, because the August Stor controls were more stringent, they had to use the business profiles that Apple gave to developers. With these certificates, you can skip app store verification and install apps that are not supported on your iPhone.
 
 
 In this way, harmful programs have been able to access many iPhones and iPads in order to steal data such as sound recordings, photographs, contacts and even the ability to access microphones in real time.
It's important to be careful with applications that we give certain permissions, because in iOS the process was relatively simple because it took advantage of the permissions granted by the user. In addition, we should always avoid downloading apps that are not in the App Store. Currently we can be cool because the affected applications have already been eliminated.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Share this

Related Posts

:)
:(
hihi
:-)
:D
=D
:-d
;(
;-(
@-)
:P
:o
:>)
(o)
:p
:-?
(p)
:-s
(m)
8-)
:-t
:-b
b-(
:-#
=p~
$-)
(y)
(f)
x-)
(k)
(h)
cheer