[Fox News] What you need to know about VajraSpy RAT, the cyber espionage tool that infiltrated Google Play

You might think that downloading an app from the app store is safe and easy, right? Well, not always. Sometimes, you might actually end up with a nasty surprise: an app that is actually spyware hiding behind a fake name and icon.

That’s what the VajraSpy RAT does. It’s a Trojan that targets Android devices and steals your data without you knowing. This is a real threat that has affected many Android users.

Although VajraSpy has been removed from the Google Play Store, it’s still lurking out there on third-party app stores. Also, VajraSpy and the Patchwork APT group behind it are still active. They may attempt to infiltrate other platforms or modify their tactics to evade Google’s detection in the future.

To protect yourself, here’s what you need to know about VajraSpy RAT, the cyber espionage tool that’s infiltrated Google Play on Android.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

VajraSpy is a remote access Trojan (RAT), which is a type of malware that’s designed to allow an attacker to control an infected device remotely. To get the RAT on your devices, scammers need you to download it to your system. Once the RAT is running on a compromised system — in this case, your Android — the attacker can send commands to it and receive data back in response.

MORE: HOW TO CHANGE YOUR PRIVACY SETTINGS ON YOUR ANDROID DEVICES

Some of VajraSpy’s capabilities are accessing and taking your contacts, photos and messages. This even includes encrypted messages like those on WhatsApp. Also, searching and exfiltrating documents, images, audio and other types of files.

In addition, it can listen in on and record your phone calls (if granted the appropriate permissions) and activate your device’s camera to take pictures, turning it into a surveillance tool.

MORE: BEWARE OF NEW ANDROID MALWARE HIDING IN POPULAR APPS

VajraSpy gets onto an unsuspecting victim’s device via a malicious app. When the RAT was first discovered, it was on apps that were found on Google Play sometime between April 1, 2021, through Sept. 10, 2023.

ESET researchers uncovered the campaign report in 2022 when Patchwork APT — a hacking group primarily targeting people in Pakistan that’s been around since 2015 — exposed their campaign after unintentionally infecting their own infrastructure with another RAT they were experimenting with.

When this was leaked and VajraSpy was discovered, the infected apps on Google Play were taken down. But they can still be found in third-party apps, with some still getting through to Google Play anyway.

VajraSpy has been disguising itself primarily in news and messaging apps on Android. Some of the apps that researchers know about include:

Google Play Protect protects users by automatically removing apps known to contain this malware on Android devices with Google Play Services. However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices. If, for some reason, you still see these apps on your phone, be sure to manually uninstall them.

Settings may vary depending on your Android phone’s manufacturer. 

We also recommend going beyond Google Play Protect to keep yourself from having your data breached. As we all know, free is not always the way to go, especially when we are talking about antivirus protection. Keeping hackers out of your devices can be prevented if you have good antivirus software installed. Find my review of Best Antivirus Protection here.

Remember, the bad guys behind VajraSpy and similar malware perpetrators are pretty quick. They keep infecting new apps with this Trojan, so always keep an eye out by using the following tips:

Tip #1 – To avoid getting your Android infiltrated by VajraSpy RAT, don’t download any apps that are recommended by someone you don’t know or don’t know well. And if the message does come from someone you know, always be a little skeptical, especially if you have never heard of the app.

Tip #2 – Make sure to only download apps from reputable app stores you’re familiar with, too. Keep in mind, though, that these bad actors are able to get new apps to slip through the cracks of Google Play time and time again. Therefore, it’s important to employ a mix of different strategies to keep yourself safe.

Tip #3 – One way to know whether or not an app is safe is by looking at how many downloads it has. If it has a small number of downloads, chances are it could be a scam. Also, look at how many reviews it has and what those reviews are and do a quick check to see if someone mentioned it as a scam or not. A good rule of thumb is if you don’t need it, and you’re not sure, don’t download it.

The good news is that compared to other spyware apps, VajraSpy hasn’t been that successful. We know this by looking at the amount of downloads/installations of the apps it disguises itself as. That being said, those third-party app stores where you can still find a lot of these malicious apps don’t track downloads well, so it’s hard to know how many victims fell for VajraSpy there.

MORE: BEWARE OF THIS MCAFEE GOOGLE CHROME AD SCAM

Though there are much bigger scams to be concerned with, letting your guard down could make you more vulnerable to attacks like this cyber espionage tool called VajraSpy RAT. To protect your Android and your data, just remember to be cautious if you see an invitation to download a messaging app from someone you don’t know well. Also, invest in antivirus software to protect your Android.

Have you ever received a strange message that asked you to download an app? What happened? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Read More 

[Fox News] A car-boat combo that can hit the road or the water with the same vehicle

Imagine cruising down the highway in your sleek electric vehicle, only to decide halfway through your journey that you’d rather be skimming across the waves. With the Trident LS-1, that’s not just a fantasy, it’s a reality. This innovative car-boat hybrid is poised to revolutionize the way we think about transportation, offering seamless land and water travel all in one vehicle.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

The Trident LS-1 (L for land, S for sea) is a three-wheel vehicle that can drive on land and then launch right into the water from a launching ramp. No trailer is needed, leaving the hassle behind. It has an electric motor that provides sustainable, zero-emission travel.

It also has hydrofoil technology that features blades or vanes that allow it to lift above the water surface about three feet, creating a smooth ride with reduced drag over the sea. It also makes steadier turns because the hull is out of the water.

MORE: SCI-FI SOLAR EVE NEVER NEEDS TO PLUG IN FOR A RECHARGE

The Trident LS-1 can go up to 35 mph on water or 15 mph without the hydrofoils. It can also handle waves of up to four feet, making it ideal for coastal travel. On land, it can reach speeds of up to 95 mph. What is even more incredible is that the Trident LS-1 is designed to prevent seasickness caused by a vessel’s erratic motion on water.

MORE: BEST DASH CAMS FOR YOUR CAR

The Trident LS-1 can accommodate up to four people comfortably with three permanent seats, including a center driver seat and two rear ones, as well as an additional fold-down center. It also comes equipped with airbags, a safety cage and multiple cameras, giving you peace of mind.

The Trident LS-1 is classified as a motorcycle/autocycle, which simplifies the regulations and registration process. With proper boat registration and a driver’s license, anyone will be able to take the car-boat hybrid for a ride. You don’t need a special license.

The vehicle is only 7 feet long, so you can easily fit it in your garage, which is what the engineering company wanted. You also don’t need a tow vehicle, which could end up in the water when you launch the boat.

The Trident LS-1 offers you the freedom and versatility to explore both land and water, without compromising on performance, comfort or safety. Whether you want to escape the traffic and enjoy a relaxing cruise on the water or have some fun and adventure on the waves, the Trident LS-1 can make it happen.

You can also be ready for any emergency situation with an amphibious vehicle that can save lives. And you can do all this while being environmentally conscious, thanks to its electric motor and zero-emission technology. The Trident LS-1 is the ultimate amphibious vehicle for anyone who wants to experience the best of both worlds.

Poseidon AmphibWorks is the company behind the Trident LS-1. It is on a mission to create electric vehicles that can go from land to sea with ease. They have a team of experts who know how to design and build these amazing machines. The company was co-founded by Andy Langesfeld and Steve Tice, who have a lot of experience in amphibious vehicles and electrical engineering. They started working on their projects in 2021 and launched the company in 2022. They are still developing their prototypes, but they promise to deliver something awesome.

MORE: IS IT A 3-WHEELER OR A 2-WHEEL E-SCOOTER? HOW ABOUT BOTH?

You might be wondering when you can get your hands on this amphibious vehicle. Well, the creators are working hard to make it happen. They are finalizing the plan for the prototype, which should be ready by the end of this year. That’s when they will start taking deposits for the vehicles. The target price of the vehicle starts at under $100,000.

If you live in California, you can buy one around December 2025. They will also have a service center in San Diego to help you out. If you live outside of California, you can still pick up a Trident LS-1 in San Diego or wait until June 2026, when they hope to ship to other states.

The Trident LS-1 is still under development, but it has the potential to reshape the transportation landscape. Its unique combination of features, affordability and environmental consciousness makes it a truly innovative product.

Would you consider this type of vehicle for your future transportation needs? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Read More 

[Fox News] Verification scams hitting Elon Musk’s X after changing former Twitter check marks

X – formerly known as Twitter – has gone through more than a name change since it switched over. One of these has been with the account verification process. You know, that little blue check mark that certain profiles have that indicates it’s verified. Without that blue check mark, it can be difficult to contact other people on X, get through certain groups and, essentially, use the platform to the fullest.

It’s no surprise that this little blue check mark has spurred a lot of controversy. But it’s not just this. The changes going on with X’s verification – aka X Premium or Premium+ – also open a whole new can of worms, specifically when it comes to cybersecurity concerns.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

Before Elon Musk took over Twitter, there was only one way to get the blue check mark – or Twitter Blue – on Twitter. To do so, you had to be a well-known figure like a celebrity, politician, journalist or part of an organization. Generally, Twitter would reach out to the person directly to confirm their identity.

Now, that’s all changed. These days, just about anyone can get a blue check mark via X’s subscription-based model if they’re willing to pay a monthly subscription fee. (And paying more can also get you a gold check mark, which is usually reserved for businesses.)

This fee not only gets you verified but also gives you the ability to do things on X that those without it can’t, like editing tweets, exposure to fewer ads and possibly more visibility for your tweet. Some accounts have even enabled a setting to only be able to receive messages from verified accounts.

MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS

Unfortunately, there is a downside to everyone being able to get that blue check mark. Not only do you now have to be concerned with getting yourself verified so that you can direct message others who have that setting enabled, but you also have to be on the lookout for scammers who are using the blue check mark to trick you. Here are three scams to look out for.

A blue-tick scammer is a person who pays to get the blue-tick check mark verification on X and then uses that to scam people. But who do they scam and how? Blue-tick scammers have a very particular method and usually target users who complain about poor customer service on X. Maybe they are even complaining specifically about the issues getting their verification on X.

Ultimately, the goal of these scammers is to trick you into disclosing your bank details by promising refunds to you. In June of last year, for example, passengers whose EasyJet flights had been canceled were targeted by cybercriminals on X in this exact way. These scammers were using fake profiles to target victims who had resorted to X to voice their complaints against the airline and demand a refund, only to potentially lose more money by being scammed.

It’s not uncommon to encounter fake accounts pretending to be well-known personalities – even Elon Musk. These accounts might lack official verification, but at first glance, they won’t give unsuspecting users a reason to doubt that the profile is who it appears to be. These Elon Musk impersonators will try just about anything, but a popular scam is in the form of cryptocurrency ads.

Here’s how the scam goes down. An ad appears on X, which appears to be coming from one of Elon Musk’s companies – or a blue-tick verified Elon Musk profile – advertising a new cryptocurrency that he’s created and steps for people to get it, ultimately encouraging you to transfer money over to the scammer’s wallet.

MORE: PROTECT YOUR BACON: THE RISE OF PIG BUTCHERING SCAMS AND HOW TO AVOID THEM

Not everyone will fall for this one, but it’s a scam as old as time that’s adapted to new rules on social media environments. If you get any direct messages from verified X accounts posing as a scantily clad woman, it could be a legitimate user. But, it could also be a scammer or even a “sexbot,” which has increased in numbers since all the changes at X as well as the introduction of AI.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

The changes on X highlight wider issues in online verification and the potential for misuse. Even if you don’t use X, scammers may attempt similar tactics on other platforms you frequent. Being aware of these scams and how they work can help you stay safe online.

The good news is that X is aware of these scams. Now, X’s non-deceptive Twitter eligibility requirements for buying a Premium subscription require the user to not have recently changed their photo, display name or username. One of the best ways to protect yourself from scams on popular social media platforms like X is to simply be aware of what new scams are out there. By staying up to date, you can know your weapon to ward off these scammers.

That being said, there are 10 steps you can take to ensure your safety on X.

1) Protect your personal information: Do not share your full name, address, phone number, email, passwords or other sensitive information with strangers or people you do not trust on X.

2) Be skeptical: If an X account seems fishy, investigate further. Check join dates, usernames and their activity history.

3) Use a unique and strong password for your account and change it regularly: Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess.

4) Enable two-factor authentication: Two-factor authentication is just an extra shield that will prevent a hacker from getting into your accounts. 2FA requires you to enter a code that is sent to your phone or email or generated by an app in addition to your password when you log in. This way, even if someone knows your password, they cannot access your account without the code.

5) Review your privacy settings: Limit who can see your posts, photos and profile information on X by changing your privacy settings.

6) Verify the source and accuracy of information: Do not believe everything you see or read on social media. Always check the source and credibility of the information before you engage with the content and share it with others. Use reliable and reputable sources to verify the source and the facts.

7) Have good antivirus software on all your devices: The best way to protect yourself from having your data breached by a scammer on X is to have antivirus protection installed on all your devices. Having antivirus software on your devices will make sure you are stopped from clicking on any potential malicious links, which may install malware on your devices, allowing hackers to gain access to your personal information. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

8) Delete anyone who tries to trick you: If anyone tries to scam you, or you encounter any suspicious accounts, consider reporting them to X immediately. You can use X’s reporting features to flag potential scams. This will also help others from being scammed.

9) Stay informed about security updates: Keep your software and apps updated to protect yourself from the latest threats.

10) Prevent strangers from following you, via X’s privacy settings: This can be a good way to prevent some of those bots or scammers from getting to you.

All you need to do is click on Settings, select Privacy and Safety, move the toggle for Protect Your Tweets and select Done. Now, only people whose accounts you approve have permission to follow you. You can also block and remove followers if the former is too strict for you.

MORE: HOW TO PROTECT YOURSELF FROM SOCIAL MEDIA SCAMMERS

Social media can be like the Wild West, especially when a bunch of new changes are happening every day. In terms of cybersecurity and protecting yourself online, it’s important to be aware of scams like this. Just because something has a blue check mark (or, anything else that would make it seem “verified” in a certain context) does not mean that it is. It’s so easy for scammers to pose as someone or something else, and chances are they’ll keep coming along. So, it’s OK to second-guess something if you’re not 100% sure; and online, we never really can be.

What are your biggest concerns about the potential for scams on the social media platforms you frequently visit? Let us know in the comments below. Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Read More 

[Fox News] This AI robot garbage picker can sort over 500 types of trash in seconds

Robots are taking over the dirty work of sorting through our trash and turning it into valuable resources. And not just any robots, but smart robots that use artificial intelligence (AI) to identify and separate different types of waste with incredible speed and accuracy.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

MORE: NO HUMAN NEEDED HERE – HOW THIS ROBOT BUILDS WALLS ALL BY ITSELF

These robots are the brainchild of ZenRobotics, a global leader in smart robotic recycling. The company has recently launched its fourth generation of waste sorting robots, called ZenRobotics 4.0, which have new features and upgraded AI to optimize and improve the efficiency of waste sorting operations. So, what are these improvements, and how do they work? Let’s take a closer look at the two models of ZenRobotics 4.0: the Heavy Picker 4.0 and the Fast Picker 4.0.

MORE: 24 MOST AMAZING COOKING GADGETS

The Heavy Picker 4.0 is a multipurpose waste sorting robot that can handle bulky materials such as wood, metal, plastic and cardboard. It is capable of sorting items weighing up to 88 pounds each, making up to 2,300 picks per hour for each robot on a sorting line. It has a compact individual recognition system (ZenBrain) that enhances precision and increases efficiency by 60%-100% compared to ZenRobotics’ previous system.

The Heavy Picker 4.0 also benefits from upgraded AI technology with an advanced global recognition database that empowers the robots to identify more than 500 waste categories. This significantly reduces setup times as the Heavy Picker 4.0 will come pre-trained to recognize various types of waste. The upgraded AI also improves motion control and gives the Heavy Picker 4.0 the ability to prioritize picking the item that has the most value to the customer.

MORE: THE NEXT GENERATION OF TESLA’S HUMANOID ROBOT MAKES ITS DEBUT

The Fast Picker 4.0 is a high-speed waste sorting robot that is ideal for lightweight materials such as paper, plastic and aluminum. It has the Heavy Picker beat at a rate of 80 picks per minute or 4,800 picks per hour. This is double the average pick rate of a human sorter, which is 30-40 picks per minute.

However, the Fast Picker 4.0 has a maximum lifting capacity of 2.2 pounds. The upgraded AI on the Fast Picker 4.0 leverages higher rates of purity, accuracy and recovery, and like the Heavy Picker 4.0, it is able to recognize more than 500 waste categories.

One of the key differences with the Fast Picker 4.0 is the customization it offers with adjustable widths and frame design for seamless integration into various picking stations. The Fast Picker 4.0 reaches the full width of the whole conveyor belt.

The Fast Picker 4.0 can also be added at the end of a line of Heavy Pickers, incorporating into waste streams such as wood, scrap and rigid plastics, and sorting smaller material pieces once the Heavy Pickers have removed the bulky material. The Fast Picker can also be easily integrated into side streams, reject recovery lines and quality control.

MORE: HOW THIS ROBOT HELPS YOU PROTECT AND CONNECT YOUR HOME

Waste operators know how challenging it is to sort and recover valuable materials from the mixed waste streams. Manual sorting is slow, expensive and risky, and it often results in low-quality recyclables that end up in landfills or incinerators. That’s where waste-sorting robots come in. They can reduce a company’s carbon footprint, save natural resources and create a circular economy where nothing is wasted.

ZenRobotics AI-powered robots can sort waste 24/7, with high speed and accuracy. They can identify and extract different types of materials, such as metals, plastics, wood, paper and more, and even find new value in waste that might be otherwise overlooked. By using ZenRobotics, companies can generate more revenue from waste, cut operational costs and meet the increasing recycling targets and regulations.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

As you can see, ZenRobotics 4.0 is a game-changer in the field of waste sorting and recycling. With its smart and fast robots, it offers a solution that is not only environmentally friendly but also economically viable and socially responsible.

How do you feel about the role of robots in waste management? Do you think it’s a step in the right direction or taking jobs away from humans who previously did it? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Read More