|How Japan and Korea becoming victims of MoqHao Spyware..? [сообщение #6240]
||Птн, 09 Август 2019 12:57
Зарегистрирован: Апрель 2019
Android users in Japan and Korea have been targeted by the latest version of malware known as MoqHao phishing attacks. The cyber attacks are still active and target Japanese and Korean customers the most. The latest version of the MoqHao is having different payloads from the current MoqHao spyware. However, there is a connection between its distribution method of current spyware and the latest version of it.|
Some Official website which are gives better acknowledge about MoqHao :
norton.com/setup | Office.com/Setup | mcafee.com/activate
The McAfee mobile research team has found a new type of Android malware for the MoqHao phishing campaign (a.k.a. XLoader and Roaming Mantis) targeting Korean and Japanese users. A series of attack campaigns are still active, mainly targeting Japanese users. The new spyware has very different payloads from the existing MoqHao samples. However, we found evidence of a connection between the distribution method used for the existing campaign and this new spyware. All the spyware we found this time pretends to be security applications targeting users in Japan and Korea. We discovered a phishing page related to DNS Hijacking attack, designed to trick the user into installing the new spyware, distributed on the Google Play store.
For more visit @ : mcafee.com/activate
Время, затраченное на генерацию страницы: 0,03368 сек.