ThreatCluster
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

Cybercriminals Use Fake Apps to Steal Data and Blackmail Users Across Asia’s Mobile Networks

Threat Score:
51
The Hacker News
7 days ago
Part of cluster #1429

Overview

Cybersecurity researchers have discovered a new, large-scale mobile malware campaign that's targeting Android and iOS platforms with fake dating, social networking, cloud storage, and car service apps to steal sensitive personal data. The cross-platform threat has been codenamed SarangTrap by Zimperium zLabs. Users in South Korea appear to be the primary focus. "This extensive campaign involved over 250 malicious Android applications and more than 80 malicious domains, all disguised as legitimat...

Continue Reading on Original Site

Related Articles

5 articles
1

Trend Micro Apex One Hit by Actively Exploited RCE Vulnerability

GB Hackers • 1 hour ago

Trend Micro Apex One Hit by Actively Exploited RCE Vulnerability Trend Micro has issued an urgent security bulletin warning customers of critical remote code execution vulnerabilities in its Apex One on-premise management console that are being actively exploited by attackers in the wild. The cybersecurity company disclosed twocommand injectionflaws on August 5, 2025, both carrying a maximum CVSS score of 9.4, indicating the severity of the threat to enterprise networks worldwide. Critical Vulne

Score
87
Read more
2
Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Brighttalk • 19 hours ago

Presented by Jitin Shabadu, Forrester Analyst | Jayce Nichols, Director, Intelligence Solutions, Google Threat Intelligence Group

Score
83
Read more
3

Cyware unveils open-source MCP Server to power AI-driven cyber defense

Feeds2 • 1 hour ago

Cyware unveils open-source MCP Server to power AI-driven cyber defense Cywarehas released Cyware MCP Server (Model Context Protocol Server) to advance the future of AI-powered cyber defense. The new open-source capability is purpose-built to enable generative AI-native workflows, allowing seamless integration between Cyware’s threat intelligence; security automation platforms and large language models (LLMs). “Cyware MCP Server exposes our Agentic AI components to AI Assistants enabling access t

Score
82
Read more
4

CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks

Cybersecurity News • 7 hours ago

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert, adding three vulnerabilities affecting D-Link devices to its Known Exploited Vulnerabilities (KEV) Catalog. The inclusion of these flaws in the catalog signifies that they are being actively exploited by malicious cyber actors in real-world attacks, posing a significant threat to networks. The […]

Score
82
Read more
5

DefCamp Capture the Flag (D-CTF) 2025 Quals

Ctftime • 48 minutes ago

Name: DefCamp Capture the Flag (D-CTF) 2025 Quals (an Defcamp CTF Qualification event.) Date: Sept. 12, 2025, 10 a.m. — 14 Sept. 2025, 10:00 UTC   [add to calendar] Format: Jeopardy On-line Offical URL: Rating weight: 0.00 Event organizers: CCSIR.org

Score
81
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

ATTACK TYPES
Credential Theft
Overlay Attack
Phishing
Social Engineering
INDUSTRIES
Banking
Financial Services
Media
COUNTRIES
Malaysia
Portugal
Saudi Arabia
South Korea
Spain
COMPANIES
Google
SECURITY VENDORS
Kaspersky
McAfee
PLATFORMS
AWS
Android
iOS
RANSOMWARE
AnDROid
Bianlian
DN
Hydra
One
MITRE ATT&CK
Masquerading
Phishing
T1003
T1053
T1059
MALWARE
BianLian (Android)
Coper
Derusbi (Windows)
Dexter
DoubleTrouble
VULNERABILITIES
Credential Theft
DOMAINS
api9.iosgaxx423.xyz
sbvhn.com
skt9.iosgaxx423.xyz
DOMAINS
sbvhn.com
api9.iosgaxx423.xyz
skt9.iosgaxx423.xyz
ARTICLE INFORMATION
Article #5404
Published 7 days ago
The Hacker News

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration