Facebook discovers a new Android malware, linked to APT hacking groups

Facebook has discovered cyber-espionage group linked to the hacking groups called ‘Bitter APT’ and APT36 (aka ‘Transparent Tribe’) using a new Android malware.

These cyberspying group uses social media platforms such as Facebook, to fetch intelligence (OSINT) or to befriend victims by using fake accounts and then take them to external platforms to install the malware.

Earlier this year, both APT36 and Bitter APT were seen arranging cyber-espionage campaigns and hence Facebook reported their recent activities.

Consequently, APT36, a Pakistan-aligned state-sponsored threat actor was exposed in a campaign while cyberattacking the the Indian government using MFA-bypassing tools. Also, the Bitter APT was seen targeting the Bangladesh government with a new malware in May 2022.

The aim of both of the groups were to infect its targets with malware by using a combination of URL shortening services, compromised sites, and third-party file hosting providers. For instance, Bitter if posts broken links or images of malicious links and if the people would type them into their browser rather than clicking on them, then in one attempt, the threat actors will evade into the systems. Bitter injects malware called Dracarys into non-official versions of YouTube, Telegram, WhatsApp, etc and then gains access of various applications on the device, including installing unknown or malicious apps.


Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

function init() { var vidDefer = document.getElementsByTagName('iframe'); for (var i=0; i