Researchers at Bitdefender have identified a new Android malware titled, Triout which acts as a framework for turning legitimate applications into spyware. It is used to inject extensive surveillance capabilities into seemingly benign applications. Triout is found bundled with a repackaged app; with capabilities including recording phone calls, logging incoming text messages, recoding videos, taking pictures and collecting GPS coordinates. Then broadcasting all of that back to an attacker-controlled C2 (command and control) server. The sample’s first appearance seems to be 15 May 2018, when it was uploaded to VirusTotal.
To read the full article and find an archive of related reporting follow this link to READBOARD.
To read the full article and find an archive of related reporting follow this link to READBOARD.