• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

Oral-B iO10 Limited Edition electric toothbrush review: The last word in luxury – and price

January 29, 2026

9 Essential iPhone Accessibility Features to Use in 2026

January 29, 2026

Apple Watch SE 3 review: The easy choice

January 29, 2026
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Security»A Russian-backed malware group is spoofing pro-Ukraine apps, Google finds
Security

A Russian-backed malware group is spoofing pro-Ukraine apps, Google finds

July 19, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
A Russian-backed malware group is spoofing pro-Ukraine apps, Google finds
Share
Facebook Twitter LinkedIn Pinterest Email

“All warfare relies on deception,” Solar Tzu wrote in The Artwork of Warfare. Some 2,500 years later, the maxim applies to the digital battlefield in addition to the bodily.

Because the battle in Ukraine rages on, researchers from Google have found malware from a Russian state-backed group disguised as a pro-Ukraine app. The small print had been revealed in a blog post printed by Google’s Menace Evaluation Group (TAG), which makes a speciality of monitoring and exposing state-sponsored hacking.

Based on TAG, the Cyber Azov app — which invokes Ukraine’s far-right military unit, the Azov Regiment — was truly created by Turla, a Kremlin-backed hacking group recognized for compromising European and American organizations with malware.

Screenshot taken from the Cyber Azov web site.
Picture: Google Menace Evaluation Group

Per TAG’s analysis, the app was distributed by means of a site managed by Turla and needed to be manually put in from the APK utility file moderately than being hosted on the Google Play Retailer. Textual content on the Cyber Azov web site claimed the app would launch denial-of-service assaults on Russian web sites, however TAG’s evaluation confirmed that the app was ineffective for this function.

In the meantime, analysis of the APK file on VirusTotal signifies that lots of the largest anti-malware suppliers flag it as a malicious app containing a Trojan.

TAG’s weblog publish means that the variety of customers who put in the app is small. Nevertheless, the Cyber Azov area was nonetheless accessible to The Verge on Tuesday morning, which means extra Android customers could possibly be tricked into downloading an app. A Bitcoin deal with listed on the web site to solicit donations had not made or received any transactions at time of publication, lending help to the evaluation that the malicious app has not achieved a large attain. (On the opposite aspect of the battle, Bitcoin and different cryptocurrencies have offered one income stream for the Ukrainian authorities and navy due to the efforts of the Ukraine-based Kuna change.)

Apart from malicious Android apps, TAG additionally flagged the exploitation of the not too long ago found Follina vulnerability in Microsoft Workplace, which permits hackers to take over computer systems utilizing maliciously crafted Phrase paperwork. The vulnerability had been utilized by teams linked to the Russian navy (GRU) to focus on media organizations in Ukraine, Google researchers stated.

The spoof app uploaded by Turla faucets into a major development within the cyber dimension of the Russia-Ukraine battle, specifically the participation of a giant decentralized base of digital volunteers hoping to assist the Ukrainian trigger. Early within the battle, Nameless-linked teams scored a variety of victories towards Russian firms by hacking and leaking delicate information, though it’s unclear what materials impact this has had on the course of the battle.

All through the invasion, Ukraine’s “IT military” has made headlines by finishing up a string of denial-of-service assaults, loosely coordinated by means of a government-endorsed Telegram channel — an organizational technique that analysts have described as a groundbreaking approach to cyber and data warfare.

Source link

See also  2021 in review: The biggest cybersecurity stories of the year
Apps finds Google group malware proUkraine Russianbacked spoofing
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

I love the Google Pixel wristlet accessory – but it has a big problem

December 6, 2025

I hate to say it, but don’t buy the Google Pixelsnap Stand

October 23, 2025

Google Pixel Watch 4 review: Pebble perfection

October 17, 2025

Google Pixel 10 Pro Fold review: Refinement, not revolution

October 8, 2025
Add A Comment

Comments are closed.

Editors Picks

FBI Says Hackers Now Targeting Connected Devices in Your Home

June 11, 2025

Minecraft controversial chat reporting features are here to stay according to developers

July 31, 2022

Best Deals Today: Get a 70-inch TV for $500 and more

July 5, 2022

Eight Ways Leaders Can Help Remote Employees Keep Corporate Files Safe

November 9, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Oral-B iO10 Limited Edition electric toothbrush review: The last word in luxury – and price

9 Essential iPhone Accessibility Features to Use in 2026

Apple Watch SE 3 review: The easy choice

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.