Close Menu
Beverly Hills Examiner

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Work stress affects your dog too, new study reveals

    May 25, 2025

    Anker Nebula X1 Home Projector Review: Gorgeous Anywhere

    May 25, 2025

    New Infrared Contacts Let You See in the Dark

    May 25, 2025
    Facebook X (Twitter) Instagram
    Beverly Hills Examiner
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    Beverly Hills Examiner
    Home»Technology»Google TAG: Cytrox’s Predator Spyware Used to Target Android Users
    Technology

    Google TAG: Cytrox’s Predator Spyware Used to Target Android Users

    By AdminMay 19, 2022
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Google TAG: Cytrox’s Predator Spyware Used to Target Android Users


    NSO Group and its powerful Pegasus malware have dominated the debate over commercial spyware vendors who sell their hacking tools to governments, but researchers and tech companies are increasingly sounding the alarm about activity in the wider surveillance-for-hire industry. As part of this effort, Google’s Threat Analysis Group is publishing details on Thursday of three campaigns that used the popular Predator spyware, developed by the North Macedonian firm Cytrox, to target Android users.

    In line with findings on Cytrox published in December by researchers at University of Toronto’s Citizen Lab, TAG saw evidence that state-sponsored actors who bought the Android exploits were located in Egypt, Armenia, Greece, Madagascar, Côte d’Ivoire, Serbia, Spain, and Indonesia. And there may have been other customers. The hacking tools took advantage of five previously unknown Android vulnerabilities, as well as known flaws that had fixes available but that victims hadn’t patched.

    “It’s important to shine some light on the surveillance vendor ecosystem and how these exploits are being sold,” says Google TAG director Shane Huntley. “We want to reduce the ability of both the vendors and the governments and other actors who buy their products to throw around these dangerous zero-days without any cost. If there’s no regulation and no downside to using these capabilities, then you’ll see it more and more.”

    The commercial spyware industry has given governments that don’t have the funds or expertise to develop their own hacking tools access to an expansive array of products and surveillance services. This allows repressive regimes and law enforcement more broadly to acquire tools that enable them to surveil dissidents, human rights activists, journalists, political opponents, and regular citizens. And while a lot of attention has been focused on spyware that targets Apple’s iOS, Android is the dominant operating system worldwide and has been facing similar exploitation attempts.

     “We just want to protect users and find this activity as quickly as possible,” Huntley says. “We don’t think we can find everything all the time, but we can slow these actors down.”

    TAG says it currently tracks more than 30 surveillance-for-hire vendors that have ranging levels of public presence and offer an array of exploits and surveillance tools. In the three Predator campaigns TAG examined, attackers sent Android users one-time links over email that looked like they had been shortened with a standard URL shortener. The attacks were targeted, focusing on just a few dozen potential victims. If a target clicked on the malicious link, it took them to a malicious page that automatically began deploying the exploits before quickly redirecting them to a legitimate website. On that malicious page, attackers deployed “Alien,” Android malware designed to load Cytrox’s full spyware tool, Predator.

    As is the case with iOS, such attacks on Android require exploiting a series of operating system vulnerabilities in sequence. By deploying fixes, operating system makers can break these attack chains, sending spyware vendors back to the drawing board to develop new or modified exploits. But while this makes it more difficult for attackers, the commercial spyware industry has still been able to flourish.

    “We can’t lose sight of the fact that NSO Group or any one of these vendors is just one piece of a broader ecosystem,” says John Scott-Railton, a senior researcher at Citizen Lab. “We need collaboration between platforms so that enforcement actions and mitigations cover the full scope of what these commercial players are doing and make it harder for them to continue.”



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleThis Is Where Dirty Old Cars Go to Die
    Next Article Rihanna Has Given Birth To Baby Boy: Reports

    RELATED POSTS

    Anker Nebula X1 Home Projector Review: Gorgeous Anywhere

    May 25, 2025

    Week in Review: Notorious hacking group tied to the Spanish government

    May 24, 2025

    Freedom of the Press Foundation Threatens Legal Action if Paramount Settles With Trump Over ’60 Minutes’ Interview

    May 24, 2025

    Startups Weekly: Cutting through Google I/O noise

    May 23, 2025

    Fire Breaks Out at a Data Center Leased by Elon Musk’s X

    May 23, 2025

    Meta adds another 650 MW of solar power to its AI push

    May 22, 2025
    latest posts

    Work stress affects your dog too, new study reveals

    If your job has you feeling tense, your dog might be feeling it too.A new…

    Anker Nebula X1 Home Projector Review: Gorgeous Anywhere

    May 25, 2025

    New Infrared Contacts Let You See in the Dark

    May 25, 2025

    Honey Don’t! – first-look review

    May 25, 2025

    Hannah and Archer, Stellaride Pregnancy, Crossovers, More

    May 25, 2025

    10 Best Silver Chains For Men – Subtle Style For 2025

    May 25, 2025

    The Buzziest Books of May | 2025

    May 25, 2025
    Categories
    • Books (536)
    • Business (5,439)
    • Film (5,377)
    • Lifestyle (3,482)
    • Music (5,430)
    • Politics (5,425)
    • Science (4,788)
    • Technology (5,374)
    • Television (5,051)
    • Uncategorized (1)
    • US News (5,428)
    popular posts

    10 Best Gaming Headsets for Switch, PC, Xbox, PS5, and PS4 (2022)

    Whether charging your new phone or slipping on a pair of earbuds for your morning…

    Was Nu Metal Metal’s Best Era? Rockers Weigh In

    July 9, 2023

    Tracer nabs $18.1 to aggregate and normalize business data

    August 10, 2023

    Watch Maggie Rogers’ vibrant new video for ‘Horses’

    July 16, 2022
    Archives
    Browse By Category
    • Books (536)
    • Business (5,439)
    • Film (5,377)
    • Lifestyle (3,482)
    • Music (5,430)
    • Politics (5,425)
    • Science (4,788)
    • Technology (5,374)
    • Television (5,051)
    • Uncategorized (1)
    • US News (5,428)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    10 Best Silver Chains For Men – Subtle Style For 2025

    May 25, 2025

    The Buzziest Books of May | 2025

    May 25, 2025

    Go and have the blood test and if you’re lucky, you’ll walk away

    May 24, 2025
    © 2025 Beverly Hills Examiner. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT