{"id":457,"date":"2024-04-01T11:03:46","date_gmt":"2024-04-01T11:03:46","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/01\/malicious-apps-caught-secretly-turning-android-phones-into-proxies-for-cybercriminals\/"},"modified":"2024-04-01T11:03:46","modified_gmt":"2024-04-01T11:03:46","slug":"malicious-apps-caught-secretly-turning-android-phones-into-proxies-for-cybercriminals","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/01\/malicious-apps-caught-secretly-turning-android-phones-into-proxies-for-cybercriminals\/","title":{"rendered":"Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals"},"content":{"rendered":"<p>\u200bSeveral malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have been observed on the Google Play Store.<br \/>\nThe findings come from HUMAN&#8217;s Satori Threat Intelligence team, which said the cluster of VPN apps came fitted with a Golang library that transformed the user&#8217;s device into a proxy node without their knowledge.\u00a0Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have been observed on the Google Play Store.<br \/>\nThe findings come from HUMAN&#8217;s Satori Threat Intelligence team, which said the cluster of VPN apps came fitted with a Golang library that transformed the user&#8217;s device into a proxy node without their knowledge.\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bSeveral malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have been observed on the Google Play Store. The findings come from HUMAN&#8217;s Satori Threat Intelligence team, which said the cluster of VPN apps came fitted with a Golang library that transformed the user&#8217;s device&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/01\/malicious-apps-caught-secretly-turning-android-phones-into-proxies-for-cybercriminals\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":458,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/457"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=457"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/457\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/458"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}