• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Technologous - Managed IT Solutions Bryan/College Station

  • Home
  • About
    • Areas We Serve
    • Our Leadership
      • Chris Dawson
      • Ian Soares
  • IT Services
    • Managed IT
    • Support IT
    • Cloud IT
  • Blog
  • Request a Consultation
  • Contact
You are here: Home / Blog / Malware Is Targeting Cookies On Android Devices To Gain Access

Malware Is Targeting Cookies On Android Devices To Gain Access

There’s a new malware threat to be aware of, called “CookieThief,” which is an apt name that describes what the malware does. Honestly though, the Hackers missed the mark here. “CookieMonster” would have been a much better name option.

In any case, it’s part of a growing new collection of malware strains that is able to steal browser and app cookies from infected devices.

It was discovered by Kaspersky Labs. Although the researchers tracking the new strain say that they’re not yet sure how the malware made its way onto infected devices in the first place.

In all, the company is tracking slightly more than a thousand infections, though that number is increasing by the day. In the cases that the researchers have investigated deeply, Facebook cookies appear to be of prime interest to the hackers, allowing them to gain account access and track user movements across the social media platform.

The Kaspersky team stressed that there is no particular security flaw or vulnerability that the hackers behind the code are exploiting. They’re simply pointing out where their main area of interest appears to be. During their analysis, the group found a fork of the code. It is similar but with a few distinct differences. The forked code launches a proxy on the infected device that makes access requests appear legitimate.

The researchers had this to say about the forked code:

“By combining these two attacks, cyber criminals can gain complete control over the victim’s account and not raise suspicion from Facebook. From there, the criminals can pose as the victim and take control of their social networking account to distribute undesirable content.”

While there are many more destructive uses that such a Trojan could be used for, the main goal of the hackers, in this case, appears to be to use compromised accounts to spread fake news stories. Even so, it’s something to be on alert for, as it would be easy to modify it to make it much more destructive.

March 24, 2020 Filed Under: Blog Tagged With: android, code, Cookies, devices, Hackers, malware

Primary Sidebar

GET OUR BLOG IN YOUR EMAIL!

Archives

  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • April 2020
  • March 2020
  • February 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • August 2018

Tags

adobe android App Apple attack Attacks Breach Browser Chrome Credit Card Dark Web Data Database Data Breach Email Facebook Firefox gmail Google Google Chrome government hacker Hackers information Intel iOS iPhone malware Microsoft Microsoft Windows 10 office 365 pandemic Password Passwords patch Phishing ransomeware Ransomware security Social Media Update Vulnerability Wifi Windows Windows 10

Footer

Contact Us

Address: 3091 University Drive, Unit 210, Bryan, Texas 77802
Phone: 979-217-1226

Our Blog

  • Rise In PC Hardware Sales Blamed on Pandemic February 26, 2021
  • Healthcare Ransomware Problem Getting Worse January 30, 2021
  • Chrome Helps Users Check Passwords For Strength January 29, 2021
  • DuckDuckGo Search Engine Sees Huge Growth January 28, 2021
  • Malware Is Android’s Worst Nightmare January 27, 2021

Search

Follow Us

  • Facebook
  • Home
  • About
  • Resources
  • Contact
  • Our Leadership
  • Why Choose Us?
  • IT Services
  • Request a Consultation

Copyright © 2021| All Rights Reserved | Powered By Technologous, LLC | Log in