• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

The Middle East faces the complication of being hacked by the ViceLeaker campaign

{{postValue.id}}

Kaspersky a research lab has found that some hackers are aiming to abstract the personal information of the android users in the Middle East. The research team found about the malware campaign named ViceLeaker in May 2018 and they also made it sure that the ViceLeaker also deals with the backdoor facilities that the hackers not only spy the information but they can also access on that information such as they can delete, share, download and can do anything they wish.

The research team confirmed that the hackers are using the small injection technique to recode the android technology. An APK which is an android app was tracked as the reason behind the data abstraction from the infected mobiles. The Kaspersky also revealed that the Viceleaker campaign was active since 2016 and their major target was Israel citizens. The hackers used the WhatsApp and telegrams to spread the APKs(android app) through which they access the information of the victims.

The research team found an app in the play which is recognized as the modified version of another app which acts as the base for the hackers. The hackers use the C2 server to use the app and they use the HTTP link to communicate with the C2 server. The research team names the operation as ViceLeakers because the hackers used variables and strings in their hacking codes. The main address they used for the backdoored version of the app was “185.51.201[.]133”. The Kaspersky also announced that although the hackers have removed all their communication channels even then ViceLeaker operation is still on access and they may be haunting for a new way to congregate their hacking tools.

Tags:
eli
Author: 

Comments ( 0 )

No comments available

Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 0 )

No questions available

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Isaac ?
How to run windows application in linux

I need to run the windows application in my Linux machine, instead of installing from yum repo or any other repos. How to do that..??

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.