Add Your Heading Text Here

Share it:
Sometimes even a completely innocent-looking site with a good reputation can be harmful — criminals may find and exploit a vulnerability. For example, they can use the site for drive-by attacks, causing each visitor to download a file automatically (and unwittingly) as soon as they get to the site. For example, Android users interested in current events in the Middle East are at risk of getting a whole menagerie — ZooPark spyware — on their phones.  
 
The current, fourth version of this Trojan can steal almost any information from your smartphone, from contacts to call logs and info you enter by keyboard. Here is the list of data that ZooPark can collect and send to its owners:  
 
 
  • Contacts
  • User account information
  • Call history
  • Call audio recordings
  • Text messages
  • Bookmarks and browser history
  • Browser search history
  • Device location
  • Device information
  • Information on installed apps
  • Any files from the memory card
  • Documents stored on the device
  • Information entered using the on-screen keyboard
  • Clipboard information
  • App-stored data (for example, data from messaging apps such as Telegram, WhatsApp, and imo, or the Chrome browser)

In addition, ZooPark can take screenshots and photos, and record videos on command. For example, it can take a picture of the phone’s owner from the front camera and send it to its command center. 

ZooPark Trojan spyware is used for targeted attacks — in other words, it’s not sent out randomly to ensnare just anyone; it aims for a specific audience. As we said, the criminals behind ZooPark target those who are interested in specific topics — in this case, Middle Eastern politics.  

How To Avoid a Zoo:   

  •        Update your operating system and important apps as updates become available. Many safety issues can be solved by installing updated versions of software.  
  •       Use mobile antivirus software to block suspicious links and apps.

Source: Kaspersky Lab Blog