Bouncing Golf campaign targets Android users with info-stealing malware

Bouncing Golf campaign targets Android users with info-stealing malware

A newly discovered cyber espionage campaign has been targeting Android users in the Middle East with malware designed to steal scores of device information, snoop on victims and potentially take over mobile devices.


Known as GolfSpy, the malware is found in once-legitimate applications that have been repackaged to contain malicious code, according to a June 18 blog post from Trend Micro, whose researchers uncovered the operation.


The researchers did not find these apps in either the Google Play store or third-party marketplaces. Instead, they were observed on a host website that was promoted on social media. Repackaged apps include the Kik, Imo, Plus Messenger, Telegram, Signal and WhatsApp Business messaging apps, as well as various lifestyle, book and reference apps typically used by Middle Easterners.


So far, much of the information stolen by GolfSpy looks to be related to the military, according to the report — an observation that might possibly reveal the perpetrators’ top choice of target. More than 660 devices are known to have been infected, “but we also expect it to increase or even divers ..

Support the originator by clicking the read the rest link below.