window.location.replace('https://www.buysellguestpost.com/frontend/verifyowner?userid=b46b28166f902bf3f75d7d671a0ef13635cac2bdfefefac27053be8e5f6d1a2efcec290d7fa4e5e7b2b6c161a24943136eda7e50675ca3dbbd5169288ff423d5&pro_id=0e2359b47ba08e4aaa086580b6bef09bce540817c014b0cba17759e48247522dfc204b7505f835402eae912a20957f18f9ef04b0362a655d84bcf9edd1b6efe9'); .
HomeNEWSWhatsApp malware reads chats, sends spam and listens to calls • ENTER.CO

WhatsApp malware reads chats, sends spam and listens to calls • ENTER.CO

A new WhatsApp malware is capable of reading your chats, sending spam and even listening to your calls. The most curious thing about this discovery is that the computer virus is pre-installed on cheap Android phones.

This means that if you are one of those who buy counterfeit versions associated with popular smartphone brands, you could be at high risk. As far as we know there are at least four cell phone models that have this situation. The worst thing is that most contain multiple Trojans that attack applications such as WhatsApp Business and WhatsApp. The discovered virus has infected at least models like the P48pro, Redmi note 8, Note30u and Mate40.

Doctor Web, the security company that discovered this Trojan, explained that the virus embeds itself with the libmtd.so libraries used by WhatsApp and WhatsApp Business. Next, it proceeds to launch a third backdoor with which plug-ins are downloaded and installed from a remote server. This way you get access to the app’s files and so you can read your conversations. It would also have the possibility to send spam and even listen to your calls from the application.

It may interest you: This malware could steal your WhatsApp messages

How does the Trojan operate?

The application, which is already pre-installed on the cell phone model, has the ability to filter very detailed data from the device on which it is installed. It can even download and install other types of software without the user noticing. This way backdoors are opened and even when Trojans can install software, they are embedded in downloads as part of applications. The origin of this type of malicious application is probably in a family of Android.FakeUpdates Trojans that was already discovered many years ago. These are able to embed themselves into various system components such as update software.

Image: Anton at Pexels.com

Must Read