Cyber Security - Exploitation - Hacking - Pentest - Hacking News - Hacking tools - Mobil App Security - 30 August 2021

Beware!! New “WhatsApp mod” Hack Your Mobile To Spy Your Activities & Steal SMS Data

WhatsApp mod

Researchers uncovered a new modified version of WhatsApp called called “FMWhatsapp” that comes with an advertising software development kit and drops a Triada Trojan to spy on your devices and steal the SMS data.

WhatsApp users are always curious about the new features since the original version has lacking with some expected features such as animated themes, self-destructing messages which automatically delete themselves, view messages that have been deleted by the sender, and so on.

This is a huge advance for the threat actors to release the modified version of WhatsApp with some extra features along with ads and displayed to the victims via different banners.

The uncovered modified version “FMWhatsapp” comes with the malicious code embedded within the app and the code employed as a payload downloader.

Experts from Kaspersky, The modified version seeking permission from the victims grant the app permission to read their SMS message, also other malicious modules loads also gain access to them.

Triada Trojan Infection Process

Once the victims downloaded and launched the app, the malware starts gathering device information such as MAC addresses, subscribers ID’s, Devices IDs and sends the details to the removed server and registers the device.

Diving deep into the App, researchers uncovered that the FMWhatsapp drops the different types of malware of the following:-

  • Trojan-Downloader.AndroidOS.Agent.ic – downloads and launches other malicious modules.
  • Trojan-Downloader.AndroidOS.Gapac.e – downloads and launches other malicious modules. Apart from that, it displays full-screen ads when users least expect them to pop up.
  • Trojan-Downloader.AndroidOS.Helper.a – downloads and launches the xHelper Trojan installer module. It also runs invisible ads in the background to increase the number of views they get.
  • Trojan.AndroidOS.MobOk.i – signs the device owner up for paid subscriptions.
  • Trojan.AndroidOS.Subscriber.l  – Signup victims for premium subcription.
  • Trojan.AndroidOS.Whatreg.b – Sign the victims whatsapp account and gathering the information such as device and mobile operator and send those details to C2 server.

Most important activities that performed by the FMWhatsApp is to  read their SMS messages, automatic sign to premium subscription.





Fatal error: Uncaught Error: Call to a member function listFiles() on null in /home/bht/public_html/wp-content/plugins/w3-total-cache/CdnEngine_GoogleDrive.php:595 Stack trace: #0 /home/bht/public_html/wp-content/plugins/w3-total-cache/CdnEngine_GoogleDrive.php(615): W3TC\CdnEngine_GoogleDrive->path_get_id() #1 /home/bht/public_html/wp-content/plugins/w3-total-cache/Cdn_Core.php(738): W3TC\CdnEngine_GoogleDrive->format_url() #2 /home/bht/public_html/wp-content/plugins/w3-total-cache/Cdn_Plugin.php(1232): W3TC\Cdn_Core->url_to_cdn_url() #3 /home/bht/public_html/wp-content/plugins/w3-total-cache/Cdn_Plugin.php(915): W3TC\_Cdn_Plugin_ContentFilter->_link_replace_callback_ask_cdn() #4 [internal function]: W3TC\_Cdn_Plugin_ContentFilter->_link_replace_callback() #5 /home/bht/public_html/wp-content/plugins/w3-total-cache/Cdn_Plugin.php(873): preg_replace_callback() #6 /home/bht/public_html/wp-content/plugins/w3-total-cache/Cdn_Plugin.php(315): W3TC\_Cdn_Plugin_ContentFilter->replace_all_links() #7 [internal function]: W3TC\Cdn_ in /home/bht/public_html/wp-content/plugins/w3-total-cache/CdnEngine_GoogleDrive.php on line 595