Close Menu
New York Examiner News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Find Online Business Accounting Tutors In Australia

    June 16, 2025

    The Chosen, the Cursed, and Those Who Rewrite Fate: 6 Must-Read Sci-Fi Books

    June 16, 2025

    Jackzebra Signs to Surf Gang, Shares Video for New Song “Givenchy”: Watch

    June 16, 2025
    Facebook X (Twitter) Instagram
    New York Examiner News
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    New York Examiner News
    Home»Technology»Google TAG: Cytrox’s Predator Spyware Used to Target Android Users
    Technology

    Google TAG: Cytrox’s Predator Spyware Used to Target Android Users

    By AdminMay 19, 2022
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Google TAG: Cytrox’s Predator Spyware Used to Target Android Users


    NSO Group and its powerful Pegasus malware have dominated the debate over commercial spyware vendors who sell their hacking tools to governments, but researchers and tech companies are increasingly sounding the alarm about activity in the wider surveillance-for-hire industry. As part of this effort, Google’s Threat Analysis Group is publishing details on Thursday of three campaigns that used the popular Predator spyware, developed by the North Macedonian firm Cytrox, to target Android users.

    In line with findings on Cytrox published in December by researchers at University of Toronto’s Citizen Lab, TAG saw evidence that state-sponsored actors who bought the Android exploits were located in Egypt, Armenia, Greece, Madagascar, Côte d’Ivoire, Serbia, Spain, and Indonesia. And there may have been other customers. The hacking tools took advantage of five previously unknown Android vulnerabilities, as well as known flaws that had fixes available but that victims hadn’t patched.

    “It’s important to shine some light on the surveillance vendor ecosystem and how these exploits are being sold,” says Google TAG director Shane Huntley. “We want to reduce the ability of both the vendors and the governments and other actors who buy their products to throw around these dangerous zero-days without any cost. If there’s no regulation and no downside to using these capabilities, then you’ll see it more and more.”

    The commercial spyware industry has given governments that don’t have the funds or expertise to develop their own hacking tools access to an expansive array of products and surveillance services. This allows repressive regimes and law enforcement more broadly to acquire tools that enable them to surveil dissidents, human rights activists, journalists, political opponents, and regular citizens. And while a lot of attention has been focused on spyware that targets Apple’s iOS, Android is the dominant operating system worldwide and has been facing similar exploitation attempts.

     “We just want to protect users and find this activity as quickly as possible,” Huntley says. “We don’t think we can find everything all the time, but we can slow these actors down.”

    TAG says it currently tracks more than 30 surveillance-for-hire vendors that have ranging levels of public presence and offer an array of exploits and surveillance tools. In the three Predator campaigns TAG examined, attackers sent Android users one-time links over email that looked like they had been shortened with a standard URL shortener. The attacks were targeted, focusing on just a few dozen potential victims. If a target clicked on the malicious link, it took them to a malicious page that automatically began deploying the exploits before quickly redirecting them to a legitimate website. On that malicious page, attackers deployed “Alien,” Android malware designed to load Cytrox’s full spyware tool, Predator.

    As is the case with iOS, such attacks on Android require exploiting a series of operating system vulnerabilities in sequence. By deploying fixes, operating system makers can break these attack chains, sending spyware vendors back to the drawing board to develop new or modified exploits. But while this makes it more difficult for attackers, the commercial spyware industry has still been able to flourish.

    “We can’t lose sight of the fact that NSO Group or any one of these vendors is just one piece of a broader ecosystem,” says John Scott-Railton, a senior researcher at Citizen Lab. “We need collaboration between platforms so that enforcement actions and mitigations cover the full scope of what these commercial players are doing and make it harder for them to continue.”



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleThis Is Where Dirty Old Cars Go to Die
    Next Article Rihanna Has Given Birth To Baby Boy: Reports

    RELATED POSTS

    Nolah Evolution Hybrid Mattress Review: A Jack of All Trades

    June 15, 2025

    Google reportedly plans to cut ties with Scale AI

    June 15, 2025

    Suspect in Minnesota Shooting Linked to Security Company, Evangelical Ministry

    June 14, 2025

    New York passes a bill to prevent AI-fueled disasters

    June 14, 2025

    The Chatbot Disinfo Inflaming the LA Protests

    June 13, 2025

    Scale AI confirms ‘significant’ investment from Meta, says CEO Alexanr Wang is leaving

    June 13, 2025
    latest posts

    Find Online Business Accounting Tutors In Australia

    In today’s competitive academic environment, understanding the principles of business accounting is essential for students…

    The Chosen, the Cursed, and Those Who Rewrite Fate: 6 Must-Read Sci-Fi Books

    June 16, 2025

    Jackzebra Signs to Surf Gang, Shares Video for New Song “Givenchy”: Watch

    June 16, 2025

    Dow futures reverse higher and oil prices pare gains as escalating Israel-Iran conflict targets critical energy assets

    June 16, 2025

    The No Kings Protest Was The Largest In US History And It Will End Trump

    June 16, 2025

    Nezza allegedly defies Dodgers to sing Spanish version of US anthem amid anti-ICE riots

    June 15, 2025

    Nolah Evolution Hybrid Mattress Review: A Jack of All Trades

    June 15, 2025
    Categories
    • Books (582)
    • Business (5,491)
    • Events (5)
    • Film (5,430)
    • Lifestyle (3,534)
    • Music (5,496)
    • Politics (5,475)
    • Science (4,840)
    • Technology (5,421)
    • Television (5,094)
    • Uncategorized (6)
    • US News (5,476)
    popular posts

    Why birds’ eyes can be blue, green, pink or orange

    The male satin bowerbird (Ptilonorhynchus violaceus) has brightly coloured eyesH Lansdown/Alamy While birds often have…

    Meta starts testing end-to-end encryption for individual Messenger chats – TechCrunch

    August 11, 2022

    6 Reflective Memoirs for Fans of Joan Didion

    November 3, 2024

    Anthropic lining up a new slate of investors, ruled out Saudi Arabia

    March 22, 2024
    Archives
    Browse By Category
    • Books (582)
    • Business (5,491)
    • Events (5)
    • Film (5,430)
    • Lifestyle (3,534)
    • Music (5,496)
    • Politics (5,475)
    • Science (4,840)
    • Technology (5,421)
    • Television (5,094)
    • Uncategorized (6)
    • US News (5,476)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    Nezza allegedly defies Dodgers to sing Spanish version of US anthem amid anti-ICE riots

    June 15, 2025

    Nolah Evolution Hybrid Mattress Review: A Jack of All Trades

    June 15, 2025

    Earth’s mantle may have hidden plumes venting heat from its core

    June 15, 2025
    © 2025 New York Examiner News. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT