Hackers are using a fake Android app named ‘SafeChat’ to infect devices with spyware malware that steals call logs, texts, and GPS locations from phones.

The Android spyware is suspected to be a variant of “Coverlm,” which steals data from communication apps such as Telegram, Signal, WhatsApp, Viber, and Facebook Messenger.

  • pumpsnabben@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    52
    ·
    1 year ago

    I have a hard time seeing how this app gets my Signal info, SMS is no longer supported in Signal.

    • loutr@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 year ago

      And give it accessibility permission, which comes with a big fat warning. Basically you need to tell Android “yes, install and run this random app I don’t really need, and give it access to all my info”.

    • d3Xt3r@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      1 year ago

      Probably why Google went from SafetyNet to Play Integrity. Maybe we should also start distrusting “integrity” as well, given how they’re trying to push the Web Integrity crap.

  • PlexSheep@feddit.de
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    2
    ·
    1 year ago

    The signal user data is only phone number and the date when the account was created iirc.

    • Björn Tantau@swg-empire.de
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      2
      ·
      1 year ago

      The malware is running on the user’s phone. There it has access to all of the data, including message contents. Doesn’t matter how secure the server and message encryption are.

      Signal’s servers were not comprimised. And like you said that would only give them a minimal dataset.

  • Campa@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    5
    ·
    1 year ago

    Thats why we should use P2P decentralized network for messaging tool… So your data won’t be store in a central sever, and no one can have access or visibility with your chats history or data.

    Recommendation:

    1. Session: P2P, E2EE, ChatRoom, DMs
    2. WireMin: P2P, E2EE, ChatSpace, DMs, FeedSpace

    Both of them are decentralized network, I preferred WireMin, because compare to Session, it has FeedSpace for blog post.

  • CarlosCheddar@lemmy.world
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    40
    ·
    1 year ago

    As much as I love the decision to be able to sideload apps on iOS I fear that we’ll start seeing headlines like these.

    • donut4ever@lemm.ee
      link
      fedilink
      English
      arrow-up
      32
      ·
      1 year ago

      That’s why you never just download and install random shit from the Internet. You gotta know and trust your source. I sidelaod all the time. Never had an issue, I just don’t grab random shit from random sites.

    • pumpsnabben@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      31
      arrow-down
      2
      ·
      1 year ago

      What do you mean? Similar vulnerabilities/apps/phishing has been available on iOS since at least 2020.

      • DarkSideOfTheMoon@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        They are way less than Android and Apple revokes the app certificate so even the download ones stop to work.

        Also the rare cases this happened in iOS the number of affected users were way small

        This is a bad whatabotism since the scale is completely different and I really fear side loading. Specially because some developers will force users to get stuff outside the App Store putting everyone in risk.

    • Dran@lemmy.world
      link
      fedilink
      English
      arrow-up
      28
      ·
      1 year ago

      A user has to click a lot of buttons to make this work, android security is doing its job. If there’s any failing on android security’s part, it’s consolidating permissions into accessibility services instead of breaking them out into something a user might get scared to click.

      Then again, they did click accessibility services on a “secure messaging” app. They need to learn somehow. I just refuse to accept that the appropriate solution is not owning things you buy. There has to be a better way.

    • sramder@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      1
      ·
      1 year ago

      I always chuckled at my Android friends having to run AV software on their phones, but then we got Pegasus and it got harder to be smug… then the shenanigans from “legitimate” devs like Über and Tencent. It doesn’t seem like blindly trusting Apple was a great idea anymore.

      • I am become Noodle@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        28
        ·
        1 year ago

        It never was. Read Apple’s true privacy agreement on their website. It’s the one you agree to but don’t read when you boot up your shiny new mac or iphone for the first time. They are no different from Microsoft or Google, they are just the best at cultivating an image.

        • Tangent5280@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          4
          ·
          1 year ago

          Prepare yourself for the downvote train approaching at near lightspeed. People cannot fathom how a for profit corporation might do anything they have to to increase profit.

          • I am become Noodle@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            9
            ·
            1 year ago

            It’s OK. Downvotes don’t matter too badly here.

            I’d say Apple being a lifestyle brand means the users aren’t going to have privacy as a primary concern is the real reason behind this. And it’s hard to get out of the walled garden once you’re in.

      • noodlejetski@geddit.social
        link
        fedilink
        English
        arrow-up
        9
        ·
        1 year ago

        Android friends having to run AV software on their phones

        which does nothing, because even IF the “antivirus” detects malware, it has no privileges necessary to remove it.

        • sramder@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 year ago

          Still a good first step… I always figured Android AV was more for people who already had a rooted phone?

          • Björn Tantau@swg-empire.de
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            Anti virus software on a smartphone makes as much sense as on a PC. Eg none at all. You just increase the attack surface for some warm fuzzy feelings.

    • 98codes@lemm.ee
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 year ago

      I won’t be sideloading anything onto my device that I can’t build myself from opensource and understand what it’s doing.

      The risk is too damn high otherwise.

      • I am become Noodle@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 year ago

        This is just good practice. You don’t have to trust anyone’s word that what you’re installing is what they say it is when you can trust your own eyes.

    • DarkSideOfTheMoon@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      6
      ·
      edit-2
      1 year ago

      They are way less than Android and Apple revokes the app certificate so even the downloaded ones stop to work.

      Also the rare cases this happened in iOS the number of affected users were way small

      This is a bad whatabotism since the scale is completely different and I really fear side loading. Specially because some developers will force users to get stuff outside the App Store putting everyone in risk.