![]() ![]() Account IDs for secure messaging apps such as KakaoTalk or Telegram are advertised on these sites as the best forms of communication and the individual initiates a conversation. The scam begins when a potential target is lured to one of the hosted sites where they are invited to connect with women. ![]() Evidence on distribution sites also suggests that this operation is functional in China, Japan, Korea, Thailand and Vietnam. These sextortion scams are exploiting Chinese-, Japanese- and Korean-speaking people in multiple Asian countries. Access to all of this data enables cybercriminals like the operators of Goontact to run a successful extortion campaign. These devices store private data, such as contacts, photos, messages and location. Tablets and smartphones are a treasure trove of personal data. We found that Goontact, which often disguises itself as secure messaging applications, can exfiltrate a wide range of data, such as: The types of sites used to distribute these malicious apps and the information exfiltrated suggests that the ultimate goal is extortion or blackmail. The spyware, which we have named Goontact, targets users of illicit sites, typically offering escort services, and steals personal information from their mobile device. ![]() The Lookout Threat Intelligence team has discovered a new mobile app threat targeting iOS and Android users in Chinese speaking countries, Korea and Japan. Diane helped with the translation portion of this research. With contributions from Diane Wee, Innovation Strategist at Lookout. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |