July 9th, 2024

Houthi rebels are operating their own GuardZoo spyware

Houthi rebels operate GuardZoo spyware, a surveillance tool similar to Pegasus. Active since 2019, it targets Yemeni military with social engineering tactics. Despite lower sophistication, GuardZoo highlights rising surveillance malware threats.

Read original articleLink Icon
Houthi rebels are operating their own GuardZoo spyware

Houthi rebels have been identified as the operators behind the GuardZoo spyware, a less sophisticated but still capable surveillance tool that can collect data similar to the notorious Pegasus malware. GuardZoo, based on the Dendroid RAT, has been active since at least 2019 and is distributed through WhatsApp or direct browser downloads using social engineering tactics. The malware targets Yemeni military members and has been found on devices in Saudi Arabia, Egypt, and Oman. While GuardZoo may not pose a significant threat to entities outside the Middle East, the rise of similar surveillance malware operated by state-backed groups is a growing concern. These tools, including GuardZoo, are effective in collecting sensitive data and tracking movements, emphasizing the importance of staying vigilant and implementing security measures. Despite its lower sophistication compared to Pegasus, GuardZoo serves as a reminder of the increasing prevalence of surveillance malware and the need for proactive cybersecurity measures.

Related

Researchers Prove Rabbit AI Breach by Sending Email to Us as Admin

Researchers Prove Rabbit AI Breach by Sending Email to Us as Admin

Researchers found a security flaw in Rabbit R1 AI assistant, exposing hardcoded API keys. Hackers could access sensitive data, impersonate the company, and send emails. Rabbitude group aims to improve security and functionality.

Shopping app Temu is "dangerous malware," spying on your texts, lawsuit claims

Shopping app Temu is "dangerous malware," spying on your texts, lawsuit claims

Arkansas AG sues Temu app for alleged data theft and privacy breaches, accusing it of sharing sensitive user data with China. Temu denies claims and plans to defend against lawsuit. Relocation to Ireland noted.

Mac users served info-stealer malware through Google ads

Mac users served info-stealer malware through Google ads

Mac users targeted by info-stealer malware via Google ads promoting fake Arc browser for Mac. Malware sends data to Poseidon info stealer control panel, extracting wallets and passwords. Google disclaims responsibility. Users urged caution.

Poseidon malware menaces Mac users via GoogleAds

Poseidon malware menaces Mac users via GoogleAds

A MacOS malware named 'Poseidon' masquerades as the Arc web browser in Google ads, redirecting users to a fake site for trojan downloads. It aims to steal credentials and VPN settings for potential data theft. Researchers warn of its resemblance to the AtomicStealer malware family, advising caution in app downloads to prevent infection and data breaches.

'Can I log into my partner's device?'

'Can I log into my partner's device?'

A leak from mSpy revealed Australian officials using stalkerware to spy on family, victims, and suspects. Concerns arise over privacy violations and misuse of surveillance technology, urging action against stalkerware.

Link Icon 3 comments
By @lawlessone - 6 months
Seems more and more like cyberpunk type scifi authors had the most accurate prediction of the future.
By @_tk_ - 6 months