GhostCtrl malware for Android records you and reads your messages

c3n0byt3

Senior Member
Joined
Sep 2, 2009
Messages
868
So how does one get this malware?
I generally go straight to the source article.

The malware is distributed through apps that masquerades as legitimate apps for WhatsApp or Pokemon GO. After the APK file has been installed on a victim's device, a process called 'com.android.engine,' a backdoor function of the malware to mislead the user into thinking that it is a safe component of the system is also loaded. However, in reality, this process contacts the malware's Command & Control (C&C) server, which will then give it instructions on what to record or steal from the victim.
 
Top