'We are still investigating, but we have found tangible correlations to a group we internally call Stellera, which we will be reporting about in the near future. 'We discard the possibility that this operation is the product of some financially motivated group,' an ESET spokesperson told ZDNet today via email. Until today, and based on its own telemetry, ESET said it spotted malware-laced NoxPlayer updates being delivered to only five victims, located in Taiwan, Hong Kong, and Sri Lanka. Despite evidence implying that attackers had access to BigNox servers since at least September 2020, ESET said the threat actor didn't target all of the company's users but instead focused on specific machines, suggesting this was a highly-targeted attack looking to infect only a certain class of users. All they did was download the update for NoxPlayer. ![]() Affected users didn’t have to visit a potentially dubious website to get malware. Note: NoxPlayer is available for both Windows and Mac. 5)On Mac, click the 'On' option next to 'Root.' Again, you must make sure you save the changes you have made and NoxPlayer will restart and be rooted once it has opened back up again. Using this access, hackers tampered with the download URL of NoxPlayer updates in the API server to deliver malware to NoxPlayer users. Recently, ESET revealed a campaign that targeted users of NoxPlayer, a popular Android emulator for PCs and Macs. Save the changes in the settings and NoxPlayer should restart and be rooted once it opens up again. ESET says that based on evidence its researchers gathered, a threat actor compromised one of the company's official API () and file-hosting servers (). ZDNet reports: The attack was discovered by Slovak security firm ESET on January 25, last week, and targeted BigNox, a company that makes NoxPlayer, a software client for emulating Android apps on Windows or macOS desktops. article/hacker-group-inserted-malware-in-noxplayer-android-emulator/. For delivering malware to NoxPlayer users the hacker used this access to attack the download URL of NoxyPlayer in the API server to transfer the virus. ![]() However, ESET recommends all NoxPlayer users stay cautious. ![]() A mysterious hacking group has compromised the server infrastructure of a popular Android emulator and has delivered malware to a handful of victims across Asia in a highly-targeted supply chain attack. The group is known to be called NightScout.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |