<p>It is not even a year since the Pegasus spyware scandal made headlines around the world. Several government agencies had hired Israeli company NSO Group for spyware to track journalists, human rights activists, and political rivals.</p>.<p>Now, Google's Threat Analysis Group (TAG) during their routine screening of zero-day threats online, has detected another spyware Predator on Android mobile phones.</p>.<p>[<strong>Note: </strong>Zero-day vulnerability is a computer/mobile software loophole wherein a solution is yet to be found. If left unattended, hackers can exploit it to modify programs, steal data from PCs, mobiles, or a network or track people]</p>.<p>CitizenLab, which was the lead investigative agency to unearth <a href="https://www.deccanherald.com/business/technology/nso-pegasus-spyware-apple-devices-still-safe-for-most-users-1010868.html" target="_blank">Pegasus spyware</a>, offered inputs to Google's TAG and it has come to light that some government-backed actors operating (at least) in Egypt, Armenia, Greece, Madagascar, Côte d’Ivoire, Serbia, Spain, and Indonesia, purchased Predator spyware to spy on journalists with Android phones. </p>.<p>The sophisticated Predator spyware is said to be created by Cytrox in North Macedonia.</p>.<p>"We assess that these campaigns delivered ALIEN, a simple Android malware in charge of loading PREDATOR, an Android implant described by CitizenLab in December 2021. ALIEN lives inside multiple privileged processes and receives commands from PREDATOR over IPC (interprocess communication). These commands include recording audio, adding CA certificates, and hiding apps," Google Threat Analysis Group said.</p>.<p>Predator spyware operators exploited the vulnerabilities in Chrome browser and Android phones and targeted journalists and activists by sending them compromised URLs via anonymous texts on messenger and email apps. When clicked, the threat actors were able to install the malware into the devices. </p>.<p>Google TAG performed the threat analysis on Samsung phones between August and October 2021 and the company has fixed the security loopholes through a security software patch. </p>.<p><strong>Zero-day vulnerabilities:</strong><br />On Chrome: CVE-2021-37973, CVE-2021-37976, CVE-2021-38000, CVE-2021-38003 in Chrome<br />On Android: CVE-2021-1048 </p>.<p>Android phone users are advised to upgrade to the latest updates. Also, it is good practice to avoid replying or clicking on URL links in messages from unknown senders.</p>.<p><em>Get the latest news on new launches, gadget reviews, apps, cybersecurity, and more on personal technology only on <a href="https://www.deccanherald.com/tag/dh-tech?_ga=2.210580691.73733284.1595225125-1706599323.1592232366" target="_blank">DH Tech.</a></em></p>
<p>It is not even a year since the Pegasus spyware scandal made headlines around the world. Several government agencies had hired Israeli company NSO Group for spyware to track journalists, human rights activists, and political rivals.</p>.<p>Now, Google's Threat Analysis Group (TAG) during their routine screening of zero-day threats online, has detected another spyware Predator on Android mobile phones.</p>.<p>[<strong>Note: </strong>Zero-day vulnerability is a computer/mobile software loophole wherein a solution is yet to be found. If left unattended, hackers can exploit it to modify programs, steal data from PCs, mobiles, or a network or track people]</p>.<p>CitizenLab, which was the lead investigative agency to unearth <a href="https://www.deccanherald.com/business/technology/nso-pegasus-spyware-apple-devices-still-safe-for-most-users-1010868.html" target="_blank">Pegasus spyware</a>, offered inputs to Google's TAG and it has come to light that some government-backed actors operating (at least) in Egypt, Armenia, Greece, Madagascar, Côte d’Ivoire, Serbia, Spain, and Indonesia, purchased Predator spyware to spy on journalists with Android phones. </p>.<p>The sophisticated Predator spyware is said to be created by Cytrox in North Macedonia.</p>.<p>"We assess that these campaigns delivered ALIEN, a simple Android malware in charge of loading PREDATOR, an Android implant described by CitizenLab in December 2021. ALIEN lives inside multiple privileged processes and receives commands from PREDATOR over IPC (interprocess communication). These commands include recording audio, adding CA certificates, and hiding apps," Google Threat Analysis Group said.</p>.<p>Predator spyware operators exploited the vulnerabilities in Chrome browser and Android phones and targeted journalists and activists by sending them compromised URLs via anonymous texts on messenger and email apps. When clicked, the threat actors were able to install the malware into the devices. </p>.<p>Google TAG performed the threat analysis on Samsung phones between August and October 2021 and the company has fixed the security loopholes through a security software patch. </p>.<p><strong>Zero-day vulnerabilities:</strong><br />On Chrome: CVE-2021-37973, CVE-2021-37976, CVE-2021-38000, CVE-2021-38003 in Chrome<br />On Android: CVE-2021-1048 </p>.<p>Android phone users are advised to upgrade to the latest updates. Also, it is good practice to avoid replying or clicking on URL links in messages from unknown senders.</p>.<p><em>Get the latest news on new launches, gadget reviews, apps, cybersecurity, and more on personal technology only on <a href="https://www.deccanherald.com/tag/dh-tech?_ga=2.210580691.73733284.1595225125-1706599323.1592232366" target="_blank">DH Tech.</a></em></p>