Houthi rebels are operating their own GuardZoo spyware
Houthi rebels operate GuardZoo spyware, a surveillance tool similar to Pegasus. Active since 2019, it targets Yemeni military with social engineering tactics. Despite lower sophistication, GuardZoo highlights rising surveillance malware threats.
Read original articleHouthi rebels have been identified as the operators behind the GuardZoo spyware, a less sophisticated but still capable surveillance tool that can collect data similar to the notorious Pegasus malware. GuardZoo, based on the Dendroid RAT, has been active since at least 2019 and is distributed through WhatsApp or direct browser downloads using social engineering tactics. The malware targets Yemeni military members and has been found on devices in Saudi Arabia, Egypt, and Oman. While GuardZoo may not pose a significant threat to entities outside the Middle East, the rise of similar surveillance malware operated by state-backed groups is a growing concern. These tools, including GuardZoo, are effective in collecting sensitive data and tracking movements, emphasizing the importance of staying vigilant and implementing security measures. Despite its lower sophistication compared to Pegasus, GuardZoo serves as a reminder of the increasing prevalence of surveillance malware and the need for proactive cybersecurity measures.
Related
Researchers Prove Rabbit AI Breach by Sending Email to Us as Admin
Researchers found a security flaw in Rabbit R1 AI assistant, exposing hardcoded API keys. Hackers could access sensitive data, impersonate the company, and send emails. Rabbitude group aims to improve security and functionality.
Shopping app Temu is "dangerous malware," spying on your texts, lawsuit claims
Arkansas AG sues Temu app for alleged data theft and privacy breaches, accusing it of sharing sensitive user data with China. Temu denies claims and plans to defend against lawsuit. Relocation to Ireland noted.
Mac users served info-stealer malware through Google ads
Mac users targeted by info-stealer malware via Google ads promoting fake Arc browser for Mac. Malware sends data to Poseidon info stealer control panel, extracting wallets and passwords. Google disclaims responsibility. Users urged caution.
Poseidon malware menaces Mac users via GoogleAds
A MacOS malware named 'Poseidon' masquerades as the Arc web browser in Google ads, redirecting users to a fake site for trojan downloads. It aims to steal credentials and VPN settings for potential data theft. Researchers warn of its resemblance to the AtomicStealer malware family, advising caution in app downloads to prevent infection and data breaches.
'Can I log into my partner's device?'
A leak from mSpy revealed Australian officials using stalkerware to spy on family, victims, and suspects. Concerns arise over privacy violations and misuse of surveillance technology, urging action against stalkerware.
Related
Researchers Prove Rabbit AI Breach by Sending Email to Us as Admin
Researchers found a security flaw in Rabbit R1 AI assistant, exposing hardcoded API keys. Hackers could access sensitive data, impersonate the company, and send emails. Rabbitude group aims to improve security and functionality.
Shopping app Temu is "dangerous malware," spying on your texts, lawsuit claims
Arkansas AG sues Temu app for alleged data theft and privacy breaches, accusing it of sharing sensitive user data with China. Temu denies claims and plans to defend against lawsuit. Relocation to Ireland noted.
Mac users served info-stealer malware through Google ads
Mac users targeted by info-stealer malware via Google ads promoting fake Arc browser for Mac. Malware sends data to Poseidon info stealer control panel, extracting wallets and passwords. Google disclaims responsibility. Users urged caution.
Poseidon malware menaces Mac users via GoogleAds
A MacOS malware named 'Poseidon' masquerades as the Arc web browser in Google ads, redirecting users to a fake site for trojan downloads. It aims to steal credentials and VPN settings for potential data theft. Researchers warn of its resemblance to the AtomicStealer malware family, advising caution in app downloads to prevent infection and data breaches.
'Can I log into my partner's device?'
A leak from mSpy revealed Australian officials using stalkerware to spy on family, victims, and suspects. Concerns arise over privacy violations and misuse of surveillance technology, urging action against stalkerware.