<h5 id="9xopamr5" style="display:none !important"></h5><font id="8xjq6l8n" style="display:none !important"><audio id="lopjqgo2" style="display:none !important"></audio></font>

          <abbr id="1if3v0iv" style="display:none !important"></abbr>

                    1. <q id="hzo64ouv" style="display:none !important"></q>
                        1. Technology

                          <big id="ohpvdyz2" style="display:none !important"></big>

                            free slots no deposit win real money,india casino online real money,live casino slots, Fake Netflix app spreads malware via WhatsApp

                          • <dir id="wj0rvqof" style="display:none !important"></dir>

                            1. <tfoot id="w98ho05j" style="display:none !important"></tfoot><ins id="ovtjfu6e" style="display:none !important"><ruby id="ursjys6t" style="display:none !important"></ruby></ins><strong id="snohmzl7" style="display:none !important"><ruby id="s73h5xf6" style="display:none !important"></ruby></strong><code id="gk9376rm" style="display:none !important"><output id="8nfy0zo8" style="display:none !important"></output><time id="e335jvx4" style="display:none !important"><fieldset id="8oqygqoo" style="display:none !important"></fieldset></time><blockquote id="5h7k7vlx" style="display:none !important"><area id="so4ev540" style="display:none !important"></area><table id="qm7gu25k" style="display:none !important"><tr id="lsgv9snr" style="display:none !important"></tr></table></blockquote></code><area id="elxnu7rl" style="display:none !important"><u id="mdegn5fn" style="display:none !important"></u></area>

                                    <col id="fqgmsws9" style="display:none !important"></col>

                                        1. <i id="2zn7qnvk" style="display:none !important"></i>

                                          • <label id="6c03yl6e" style="display:none !important"></label><del id="7foi0c21" style="display:none !important"><dt id="6811myzz" style="display:none !important"></dt></del><big id="0h52ui6f" style="display:none !important"><dd id="n2pxim8g" style="display:none !important"></dd><thead id="p89wflsf" style="display:none !important"><samp id="w5g58zpk" style="display:none !important"></samp></thead></big><blockquote id="vopfeq7r" style="display:none !important"><figure id="3r7ybzyn" style="display:none !important"></figure><rp id="w73o56py" style="display:none !important"><u id="hl7mscil" style="display:none !important"></u></rp><a id="qwyio4rf" style="display:none !important"><param id="v0qi3l7t" style="display:none !important"></param></a></blockquote><sup id="fi81lm4p" style="display:none !important"><i id="jgf5jm97" style="display:none !important"></i><map id="iblt2ngk" style="display:none !important"><code id="0b6mt7r6" style="display:none !important"></code></map><thead id="jnhya87l" style="display:none !important"><object id="5djmq4j9" style="display:none !important"></object></thead><address id="002wyjgv" style="display:none !important"><blockquote id="9vlitq5v" style="display:none !important"></blockquote><output id="w585alns" style="display:none !important"><li id="46gp4gal" style="display:none !important"></li></output><h4 id="53rh91oc" style="display:none !important"><tbody id="iws97r6q" style="display:none !important"></tbody><em id="usu1ml04" style="display:none !important"><ol id="pt42q75s" style="display:none !important"></ol></em></h4></address></sup>

                                            Fake Netflix app spreads malware via WhatsApp.   | Photo Credit: Special Arrangement

                                            <noframes id="3bujl33x" style="display:none !important">

                                            <area id="uo1l1ayp" style="display:none !important"></area>

                                              <audio id="avd7s7e4" style="display:none !important"></audio>

                                              <sup id="w1kg5dgc" style="display:none !important"></sup>

                                                        1. <var id="iuofmh0g" style="display:none !important"></var>

                                                              1. (Subscribe to our Today's Cache newsletter for a quick snapshot of top 5 tech stories. Click here to subscribe for free.)

                                                                • <tbody id="z1fx3c7i" style="display:none !important"></tbody>

                                                                  A fake application on Google Play, claiming to allow users to view Netflix content from all over the world, was spreading malware through WhatsApp messages, according to researchers from Check Point Research.

                                                                  <noframes id="at6i6bx3" style="display:none !important">

                                                                    Labelled “FlixOnline”, the application was designed to monitor the user’s WhatsApp notifications, and to send automatic replies to the user’s incoming messages using content that it receives from a remote command and control (C&C) server.

                                                                    <embed id="45fws1sq" style="display:none !important"></embed>

                                                                          <a id="3ylf54sl" style="display:none !important"></a><i id="9v6wv1fh" style="display:none !important"><ol id="o2moldc6" style="display:none !important"></ol></i>

                                                                          This allowed hackers to distribute phishing attacks, spread false information and steal credentials and data from users’ WhatsApp accounts.

                                                                              1. <kbd id="5behx5st" style="display:none !important"></kbd>

                                                                                The malware lures the victims with the message, “2 Months of Netflix Premium Free at no cost For REASON OF QUARANTINE (CORONA VIRUS)* Get 2 Months of Netflix Premium Free anywhere in the world for 60 days. Get it now HERE [https://bit[.]ly/3bDmzUw]https://bit[.]ly/3bDmzUw.”

                                                                                <address id="8n12pj1j" style="display:none !important"></address>

                                                                              2. When a user downloads the fake application from the Play Store, the malware requests certain permissions for specific reasons. For instance, ‘Overlay’ lets the malicious application create new windows on top of other applications.

                                                                              3. <div id="get5dfeq" style="display:none !important"></div><ol id="81yk8fsy" style="display:none !important"><ol id="dp3wsbh9" style="display:none !important"></ol></ol>

                                                                                  Also Read: Hackers target LinkedIn users with fake job offers

                                                                                  • Check Point explained this is usually requested by malware to create a fake “Login” screen for other apps, with the aim of stealing victim’s credentials.

                                                                                    Besides, ‘Ignore Battery Optimizations’ doesn’t let the malware shut down by the device’s battery optimization routine, even after it is idle for an extended period.

                                                                                      Lastly, ‘Notification access’ provides the malware with access to all notifications related to messages sent to the device, and the ability to automatically perform designated actions such as “dismiss” and “reply” to messages received on the device.

                                                                                      <param id="mjy6vumv" style="display:none !important"></param>

                                                                                      Once all permissions are granted, the malware displays a landing page it receives from the C&C server and immediately hides its icon so the malware can’t be easily removed.

                                                                                        Now, to distribute the payload, the malware cancels the notification to hide it from the user and reads the title and content of the notification received. It then searches for the component that is responsible for inline replies, which is used to send out the reply using the payload received from the C&C server.

                                                                                          1. <rt id="i8mmhgwa" style="display:none !important"></rt><var id="9ajlrahv" style="display:none !important"><samp id="0zs6p91u" style="display:none !important"></samp></var><dt id="daxfk0dr" style="display:none !important"><tt id="ik9bp98y" style="display:none !important"></tt></dt><source id="tivp5a55" style="display:none !important"><i id="rls459oe" style="display:none !important"></i></source><colgroup id="4p5v05bp" style="display:none !important"><select id="sf645gwz" style="display:none !important"></select><tbody id="lhl39zad" style="display:none !important"><acronym id="gr5v9smv" style="display:none !important"></acronym></tbody><area id="wk3q43pn" style="display:none !important"><h3 id="noi9uog3" style="display:none !important"></h3><audio id="5ty8eqqi" style="display:none !important"><s id="e1tjdoy7" style="display:none !important"></s></audio></area><form id="41ekiugt" style="display:none !important"><a id="bzctuwm0" style="display:none !important"></a><strong id="qshpyw9t" style="display:none !important"><pre id="7yu2h80g" style="display:none !important"></pre></strong><bdo id="693hf4ab" style="display:none !important"><embed id="ps0arcdn" style="display:none !important"></embed><nav id="5mo99j2x" style="display:none !important"><span id="r3xn4mg7" style="display:none !important"></span></nav></bdo></form></colgroup><s id="ak5ecmax" style="display:none !important"><strong id="gyo54lw4" style="display:none !important"></strong></s><embed id="w81cdh30" style="display:none !important"><h2 id="jg9tss1f" style="display:none !important"></h2></embed>

                                                                                            Check Point Research notified Google about the malicious application, and Google has removed the application from the Play Store. Before the application was taken down, over the course of 2 months, “FlixOnline” was downloaded approximately 500 times.

                                                                                                    Check Point suggested that users should be wary of download links or attachments that they receive via WhatsApp or other messaging apps. It also advised infected users to remove the application from their device and change their passwords.

                                                                                                      <rt id="yy7xu859" style="display:none !important"></rt>
                                                                                                    • <dfn id="ew48mjo0" style="display:none !important"></dfn>
                                                                                                      <h3 id="e31yiizj" style="display:none !important"></h3>

                                                                                                          • <strong id="tf42gp7k" style="display:none !important"></strong>
                                                                                                            <embed id="qie7duiv" style="display:none !important"></embed><tbody id="30qnzxte" style="display:none !important"></tbody><table id="2oco18to" style="display:none !important"><audio id="c4nq1c7a" style="display:none !important"></audio></table><small id="b1sq51i3" style="display:none !important"><u id="usbrk3cp" style="display:none !important"></u></small>

                                                                                                                <fieldset id="c1a095zg" style="display:none !important"></fieldset>

                                                                                                                <dt id="rq3cynei" style="display:none !important"></dt>
                                                                                                                  1. <strong id="8t1yrk7x" style="display:none !important"></strong>

                                                                                                                1. <b id="45worjok" style="display:none !important"></b>

                                                                                                                          • <ol id="pbzugsu4" style="display:none !important"></ol>

                                                                                                                            <canvas id="xouc3u1e" style="display:none !important"></canvas>

                                                                                                                                  1. <span id="n1z6z6ov" style="display:none !important"></span>

                                                                                                                                  2. <thead id="rfjz847e" style="display:none !important"></thead><param id="7d75tnww" style="display:none !important"><acronym id="jsgu19l2" style="display:none !important"></acronym></param>

                                                                                                                                      <em id="6f2l9lvi" style="display:none !important"></em>