UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
Forwarded from Backup Legal Mega
4 TB Uploading some more ...

(beginers & pro)

Another 4,29 Tb Useful things (
2019-new
e (Over 10k Courses, Ebooks, Etc)

ENJOY β€οΈπŸ‘πŸ»
https://mega.nz/folder/TjAGxSLD#pi9cuU55Kqze_7v9tzsMHQ
have a good Sunday β€οΈπŸ‘πŸΏ
Random Pdfs secret tricks & methodes ..tutorials :)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Android malware named FakeSpy "reappears" after three years is more dangerous than before :
#News

> According to foreign media BGR reports, an Android malware called FakeSpy reproduces Jianghu, the current main target is users in the United States and Western Europe. The application can steal user text messages, bank information and application data. The malware was spread via a text message that appeared to come from a local post office, and instructed users to download an application disguised as a legitimate post office application.


> According to a new report from Cybereason, a dangerous Android malware called FakeSpy has reappeared. FakeSpy was first discovered by security researchers nearly three years ago. It is a particularly malicious malware designed to steal user text messages, financial data, bank login information, application data, contact lists, etc.

>In its initial incarnation, the app targets users in South Korea and Japan. Recently, however, this application has become more ambitious, and is now targeting users around the world. Currently, some countries targeted by the malware include China, France, Germany, the United Kingdom and the United States. It is reported that the current iteration of FakeSpy is also more powerful and complicated than the original version, which means that Android users should be particularly vigilant to avoid receiving suspicious information.

> FakeSpy's way of spreading is quite clever. The first is a text message claiming to be from a local post office. The text message claimed that the post office tried to deliver a package, but the user could not deliver it because the user was not at home. Then, it provides a link that the user can click, which leads the user to download an application disguised as a legitimate postal service application. Once installed on the device, the app will send fake text messages and malicious links to the user's entire contact list.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁