<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Attack Archives - Tricky Enough</title>
	<atom:link href="https://www.trickyenough.com/news-tag/cyber-attack/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.trickyenough.com/news-tag/cyber-attack/</link>
	<description>Explore and Share the Tech</description>
	<lastBuildDate>Fri, 09 May 2025 22:33:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.trickyenough.com/wp-content/uploads/2021/05/favicon-32x32-1.png</url>
	<title>Cyber Attack Archives - Tricky Enough</title>
	<link>https://www.trickyenough.com/news-tag/cyber-attack/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">100835972</site>	<item>
		<title>AT&#038;T Faces A Cyber Attack, Millions Of Data Leaked On Dark Web</title>
		<link>https://www.trickyenough.com/news/cyber-attack-at-att-millions-of-data-leaked-on-dark-web/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-attack-at-att-millions-of-data-leaked-on-dark-web</link>
					<comments>https://www.trickyenough.com/news/cyber-attack-at-att-millions-of-data-leaked-on-dark-web/#respond</comments>
		
		<dc:creator><![CDATA[Sunanda Sharma]]></dc:creator>
		<pubDate>Mon, 01 Apr 2024 15:10:41 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=117970</guid>

					<description><![CDATA[<p>AT&#38;T the US-based telecommunications company announced on Saturday that personal data of 73 million current and former accounts was leaked onto the dark web due to a cyberattack. The telecom company is currently investigating the cyber attack, which occurred about two weeks ago. Everything you need to know On Saturday, AT&#38;T was hit by a...</p>
<p>The post <a href="https://www.trickyenough.com/news/cyber-attack-at-att-millions-of-data-leaked-on-dark-web/">AT&amp;T Faces A Cyber Attack, Millions Of Data Leaked On Dark Web</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[




<p>AT&amp;T the US-based telecommunications company announced on Saturday that personal data of 73 million current and former accounts was leaked onto the dark web due to a cyberattack. The telecom company is currently investigating the cyber attack, which occurred about two weeks ago. </p>



<h2 class="wp-block-heading" id="h-everything-you-need-to-know">Everything you need to know </h2>



<p>On Saturday, AT&amp;T was hit by a cyber attack, resulting in 73 million accounts being leaked onto the dark web. The <a href="https://www.trickyenough.com/news/reddit-selling-data-to-google-for-ai-training-purposes/" target="_blank" rel="noreferrer noopener">company confirmed the data</a> to be from 2019 &amp; earlier. So far no evidence has been found as to what led to the cyber attack.</p>



<p>Although the company has reassured its account holders calling the situation unaffected. “As of today, this incident has not had a material impact on AT&amp;T’s operations,” the company wrote in a press release on Saturday.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="AT&amp;T dark web data leak of over 70 million current, former customers" width="500" height="281" src="https://www.youtube.com/embed/CA6-A4UW6As?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p>The leaked information included data such as names, home addresses, phone numbers, date of birth, and Social Security Numbers. The company has advised users to set up fraud alerts and check their accounts and credit reports via email. </p>



<p>All the passcodes of the 7.6 million account holders have been reset. The event has caused a sudden panic in casual lives and reminded the importance of cybersecurity.</p>



<h2 class="wp-block-heading" id="h-how-can-we-prevent-a-cyber-attack-from-taking-place">How Can We Prevent A Cyber Attack from Taking Place</h2>



<p>In today&#8217;s world, <a href="https://www.trickyenough.com/how-to-create-a-strong-cybersecurity-culture-in-your-organization/" target="_blank" rel="noreferrer noopener">cybersecurity is more important than ever</a>. With ever-growing threats to businesses, having a strong security solution is essential. A simple hack into the system can lead to legal problems. There are far too many threats out there to ignore the risks.</p>



<p>Here are some ways to prevent cyber attacks :</p>



<ul class="wp-block-list">
<li>Keep your software and systems fully up-to-date</li>



<li>Ensure Endpoint Protection</li>



<li>Install a Firewall</li>



<li>Backup your data</li>



<li>Wifi Security</li>



<li>Passwords</li>
</ul>



<h2 class="wp-block-heading" id="h-conclusion">Conclusion</h2>



<p>With the recent event of cyber attack taking place at AT&amp;T, digital users and companies have become cautious. As for AT&amp;T, further investigation is still in progress. The company has managed to take care of the situation professionally and keep up with its reputation. </p>



<p><strong>Suggested Posts:</strong><br><a href="https://www.trickyenough.com/know-all-about-cybersecurity-and-its-importance-here/" target="_blank" rel="noreferrer noopener">Know All About CyberSecurity And Its Importance</a>.</p>



<p><a href="https://www.trickyenough.com/best-practices-for-mobile-app-security-and-data-privacy/" target="_blank" rel="noreferrer noopener">Best Practices for Mobile Security and Data Privacy</a>.</p>


<p>The post <a href="https://www.trickyenough.com/news/cyber-attack-at-att-millions-of-data-leaked-on-dark-web/">AT&amp;T Faces A Cyber Attack, Millions Of Data Leaked On Dark Web</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/cyber-attack-at-att-millions-of-data-leaked-on-dark-web/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">117970</post-id>	</item>
		<item>
		<title>Hack the Box &#8211; Community-Powered Cybersecurity Game</title>
		<link>https://www.trickyenough.com/news/hack-the-box-community-powered-cybersecurity-game/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hack-the-box-community-powered-cybersecurity-game</link>
					<comments>https://www.trickyenough.com/news/hack-the-box-community-powered-cybersecurity-game/#respond</comments>
		
		<dc:creator><![CDATA[Ashish Sidhu]]></dc:creator>
		<pubDate>Tue, 07 Nov 2023 22:34:28 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=104592</guid>

					<description><![CDATA[<p>Cybersecurity is in a perpetual metamorphosis, with an ever-evolving landscape of threats. Remaining abreast of the most current perils is an imperative duty to safeguard global businesses. A mere fleeting lapse can expose a company&#8217;s sensitive data, instigating operational disruptions and eroding the trust of clientele, as exemplified by several high-profile instances. Hack the Box...</p>
<p>The post <a href="https://www.trickyenough.com/news/hack-the-box-community-powered-cybersecurity-game/">Hack the Box &#8211; Community-Powered Cybersecurity Game</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd"><br />
<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"><br />
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"></p>


</head><body><p>Cybersecurity is in a perpetual metamorphosis, with an ever-evolving landscape of threats. Remaining abreast of the most current perils is an imperative duty to safeguard global businesses. A mere fleeting lapse can expose a company&#8217;s sensitive data, instigating operational disruptions and eroding the trust of clientele, as exemplified by several high-profile instances. Hack the Box takes on the vital task of bridging the cybersecurity skills gap.</p>



<p><a href="https://www.hackthebox.com/" target="_blank" rel="nofollow noopener">This game</a> provides a distinctive and constantly evolving online upskilling, training, and certification for cybersecurity. Hack the Box is the go-to <a href="https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/" target="_blank" rel="noreferrer noopener">choice for cybersecurity</a> training with a community of over 1.5 million members. This community includes trusted brands like Toyota, Siemens, and EA Sports.</p>



<h2 class="wp-block-heading" id="h-trusted-by-industry-leaders-choose-hack-the-box-for-cybersecurity-training">Trusted by Industry Leaders Choose Hack the Box for Cybersecurity Training</h2>



<p>Why choose cybersecurity training with Hack the Box over traditional IT modules typically offered by businesses? Hack the Box founder <a href="https://www.linkedin.com/in/hpylarinos?originalSubdomain=gr" target="_blank" rel="nofollow noopener">Haris Pylarinos</a> champions a platform that &#8220;connects cyber-ready individuals and organizations through immersive hacking experiences, fostering creative problem-solving.&#8221;</p>



<p>The training environment within the game encompasses a wide array of technologies and infrastructures, spanning conventional networks, endpoints, web applications, and cloud-based systems. This renders it an all-encompassing and versatile platform.</p>



<h2 class="wp-block-heading" id="h-communities-offer-a-vast-wellspring-of-knowledge">Communities offer a vast wellspring of knowledge</h2>



<p>Headquartered in the Southeast, our company&#8217;s mission is to actively engage businesses and their employees in understanding the <a href="https://www.trickyenough.com/cybersecurity-threats-ruin-content-marketing-for-smbs/" target="_blank" rel="noreferrer noopener">ever-evolving cybersecurity</a> threat landscape. We offer more than mundane modules and checklists you breeze through during your morning tea break. Instead, we provide highly captivating learning content replicating real-world threat scenarios, incorporating the most current attack techniques and methods.</p>



<p>Haris Pylarinos, the founder, proudly states, &#8220;Hackers for hackers built Hack The Box.&#8221; Traditional training content must often be updated and reflect real-world challenges, creating a void in the cybersecurity training industry for a dynamic, adaptable, and cloud-based approach.</p>



<p><strong>Recommended:</strong></p>



<p><a href="https://www.trickyenough.com/how-to-create-a-strong-cybersecurity-culture-in-your-organization/" target="_blank" rel="noreferrer noopener">How to Create a Strong Cybersecurity Culture in Your Organization</a>?</p>



<p><a href="https://www.trickyenough.com/the-growing-role-of-machine-learning-in-cybersecurity/" target="_blank" rel="noreferrer noopener">The Growing Role of Machine Learning in Cybersecurity</a>.</p>


<p></body></html></p><p>The post <a href="https://www.trickyenough.com/news/hack-the-box-community-powered-cybersecurity-game/">Hack the Box &#8211; Community-Powered Cybersecurity Game</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/hack-the-box-community-powered-cybersecurity-game/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">104592</post-id>	</item>
		<item>
		<title>Kaspersky Finds Cybersecurity Threat that Targets iPhone Users via iMessage to Gain Access</title>
		<link>https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access</link>
					<comments>https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/#respond</comments>
		
		<dc:creator><![CDATA[Vipin Gupta]]></dc:creator>
		<pubDate>Wed, 14 Jun 2023 15:05:36 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=86343</guid>

					<description><![CDATA[<p>If you&#8217;re an iPhone user, then you must be alert and careful before what you click on. There&#8217;s a new cyber threat found via Kaspersky Internet Security that targets iPhone devices and takes complete control of the device. One of the biggest cybersecurity and antivirus software companies &#8216;Kaspersky Internet Security&#8217; recently found a cybersecurity threat...</p>
<p>The post <a href="https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/">Kaspersky Finds Cybersecurity Threat that Targets iPhone Users via iMessage to Gain Access</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head><body><p>If you&#8217;re an iPhone user, then you must be alert and careful before what you click on. There&#8217;s a new cyber threat found via Kaspersky Internet Security that targets iPhone devices and takes complete control of the device.</p>



<p>One of the biggest cybersecurity and antivirus software companies &#8216;Kaspersky Internet Security&#8217; recently found a <a href="https://www.trickyenough.com/news/cyber-attack-at-att-millions-of-data-leaked-on-dark-web/" target="_blank" rel="noreferrer noopener">cybersecurity threat</a> called &#8216;Triangulation&#8217;. This threat targets old versions of iPhones, such as iOS 15.7, and gains complete access via the iMessage app.</p>



<h2 class="wp-block-heading" id="h-imessage-app-at-risk-kaspersky-internet-security">iMessage App at Risk kaspersky internet security</h2>



<p>The iMessage app contains a malicious attachment that automatically installs spyware &amp; takes complete control over the iPhone and its data.</p>



<p><a href="https://securelist.com/operation-triangulation/109842/" target="_blank" rel="noreferrer noopener nofollow">As per the Kaspersky report</a>, they just uncovered a cybersecurity threat. It is extremely complex &amp; targets iPhone devices via the iMessage app by auto-installing spyware and taking complete control of it.</p>



<h2 class="wp-block-heading" id="h-operation-triangulation">Operation Triangulation</h2>



<p>Also, Kaspersky CEO Eugene Kaspersky tweeted about this iOS attack, and it is called Triangulation. He said, &#8220;Our investigation of this Triangulation continues, and we expect further details to be shared soon.&#8221;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img fetchpriority="high" decoding="async" width="664" height="646" src="https://www.trickyenough.com/wp-content/uploads/2023/06/kaspersky-internet-security.jpeg" alt="" class="wp-image-86347" srcset="https://www.trickyenough.com/wp-content/uploads/2023/06/kaspersky-internet-security.jpeg 664w, https://www.trickyenough.com/wp-content/uploads/2023/06/kaspersky-internet-security-300x292.jpeg 300w, https://www.trickyenough.com/wp-content/uploads/2023/06/kaspersky-internet-security-150x146.jpeg 150w" sizes="(max-width: 664px) 100vw, 664px" /></figure></div>


<p>In the Kaspersky report, they said that their team of iPhone users <a href="https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/" target="_blank" rel="noreferrer noopener">recognized this malware attack</a>. This threat is quietly entered via the iMessage app and gets access to microphones, cameras, photos, messages, geolocation, and other sensitive data. </p>



<p>He also said that this threat had been neutralized and complete <a href="https://www.trickyenough.com/news/wordpress-tracks-down-xss-vulnerability-users-to-update-to-6-5-2/" target="_blank" rel="noreferrer noopener">vulnerability details</a> had been sent to the Apple company.</p>



<p>Further investigation shows that dozens of iPhone devices were infected with this attack.</p>



<h2 class="wp-block-heading" id="h-the-zero-click-attack-kaspersky-internet-security">The Zero-Click Attack kaspersky internet security</h2>



<p>Getting this threat inside the iPhone device is easier; the user will receive a message on the iMessage app with an attachment. When the user <a href="https://www.trickyenough.com/news/bumble-compliments-feature-has-rolled-out-that-allow-users-to-message-before-match/" target="_blank" rel="noreferrer noopener">opens the message</a>, a threat will automatically go inside the device and take complete control over the device. Once the hacker gets complete control, the message with the attachment will automatically be selected from the device.</p>



<p>On Friday, Kaspersky also released tools to identify if the device is infected. </p>



<p>One of the clear indications or ideas to check this Triangulation attack on iPhone devices was that it turned off the iOS update and didn&#8217;t allow users to update their iOS version. </p>



<p>The CEO of Kaspersky noticed that turning off the iMessage app can prevent iOS devices from being attacked. <a href="https://www.trickyenough.com/news/ios-16-adoption-rate-reaches-81-ahead-of-ios-17-announcement/" target="_blank" rel="noreferrer noopener">iOS 16 seems safe </a>from this Triangulation threat, and there are low chances but not guaranteed.</p>



<h2 class="wp-block-heading" id="h-apple-ios-16-3-updates">Apple iOS 16.3 Updates</h2>



<p>Furthermore, Apple released major updates that fixed vulnerabilities with iOS 16.3 and MacOS 13.2 supported iPhone, iPad, and Mac devices.</p>



<p>Suggested:</p>



<p><a href="https://www.trickyenough.com/security-good-antivirus/" target="_blank" rel="noreferrer noopener">What Security features must have in Good Antivirus</a>?</p>



<p><a href="https://www.trickyenough.com/remove-malware-from-computer/" target="_blank" rel="noreferrer noopener">How To Remove Malware From Computer</a>?</p>
</body></html>
<p>The post <a href="https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/">Kaspersky Finds Cybersecurity Threat that Targets iPhone Users via iMessage to Gain Access</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">86343</post-id>	</item>
		<item>
		<title>&#8220;Goldoson,&#8221; an Android Malware, Invade 60 Applications on Google Play</title>
		<link>https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=goldoson-an-android-malware-invade-60-applications-on-google-play</link>
					<comments>https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/#respond</comments>
		
		<dc:creator><![CDATA[Namita Mahajan]]></dc:creator>
		<pubDate>Fri, 19 May 2023 08:52:45 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=84237</guid>

					<description><![CDATA[<p>Goldoson is an Android malware that invades 60 applications. These applications had 100M downloads collectively. This malware is a third-party library component that all 60 applications were using. However, the developers were not known about the malware. Here is the list of a few infected applications: McFee&#8217;s research team discovered this malware, &#8220;Goldoson.&#8221; According to...</p>
<p>The post <a href="https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/">&#8220;Goldoson,&#8221; an Android Malware, Invade 60 Applications on Google Play</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Goldoson is an Android malware that invades 60 applications. These applications had 100M downloads collectively. This malware is a third-party library component that all 60 applications were using. However, the developers were not known about the malware.</p>



<p><strong>Here is the list of a few infected applications:</strong></p>



<ul class="wp-block-list">
<li>L.POINT with L.PAY &#8211; 10 million downloads</li>



<li>Pikicast &#8211; 5 million downloads</li>



<li>Swipe Brick Breaker &#8211; 10 million downloads</li>



<li>Money Manager Expense &amp; Budget &#8211; 10 million downloads</li>



<li>LIVE Score, Real-Time Score &#8211; 5 million downloads</li>



<li>GOM Player &#8211; 5 million downloads</li>



<li>Compass 9: Smart Compass &#8211; 1 million downloads</li>



<li>and more</li>
</ul>



<p>McFee&#8217;s research team discovered this malware, &#8220;Goldoson.&#8221; <a href="https://www.mcafee.com/blogs/other-blogs/mcafee-labs/goldoson-privacy-invasive-and-clicker-android-adware-found-in-popular-apps-in-south-korea/" target="_blank" rel="noreferrer noopener">According to them</a>, the malware collected data from different resources, including the user&#8217;s GPS location, WiFi-connected devices, Bluetooth devices, and installed apps.</p>



<p>Moreover, it could do ad fraud if a user clicks on any ad without taking consent from the user.</p>



<h2 class="wp-block-heading" id="h-android-malware-steals-data-from-devices">Android Malware <strong>Steals Data from Devices</strong></h2>



<p>If a user downloads and installs any application containing Goldoson, its library automatically logs the device and captures its configuration using a remote private server.</p>



<p>The configuration includes all the parameters Android malware can run on the device for ad clicking and data stealing.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img decoding="async" width="595" height="795" src="https://d1w4k2ccg1tr4m.cloudfront.net/wp-content/uploads/2023/05/config.webp" alt="Android Malware" class="wp-image-84239" srcset="https://www.trickyenough.com/wp-content/uploads/2023/05/config.webp 595w, https://www.trickyenough.com/wp-content/uploads/2023/05/config-225x300.webp 225w, https://www.trickyenough.com/wp-content/uploads/2023/05/config-150x200.webp 150w" sizes="(max-width: 595px) 100vw, 595px" /></figure></div>


<p>Every two days, it collects data by activating the function of data collection. Then, it sends the C2 server the list of geographical locations, installed apps, and MAC addresses of the devices connected via WiFi, Bluetooth, etc.</p>



<p>The data amount collected by the malware depended on the permissions provided by the user. For example, Devices with <a href="https://www.trickyenough.com/exploring-android-11-and-android-12-android-studio-4-0-features/" target="_blank" rel="noreferrer noopener">Android 11</a> or above provide high-level protection for data. So, they might be less affected compared to the lower versions.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img decoding="async" width="609" height="334" src="https://d1w4k2ccg1tr4m.cloudfront.net/wp-content/uploads/2023/05/json-data.jpg" alt="" class="wp-image-84240" srcset="https://www.trickyenough.com/wp-content/uploads/2023/05/json-data.jpg 609w, https://www.trickyenough.com/wp-content/uploads/2023/05/json-data-300x165.jpg 300w, https://www.trickyenough.com/wp-content/uploads/2023/05/json-data-150x82.jpg 150w" sizes="(max-width: 609px) 100vw, 609px" /></figure></div>


<p>However, McAfee also found that in recent OS versions, users gave malware enough permission to collect sensitive data of their devices in 10% of apps. Along with that, The function of ad-clicking is activated using a customized HTML code, various URL visits, WebView, and generating ad revenues.</p>



<p>Goldoson libraries are removed from the Google Play app. But, MaAfee warned the users to always check twice before allowing permissions to any application because the risk is still there.</p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/remove-malware-from-computer/" target="_blank" rel="noreferrer noopener">How To Remove Malware From Computer</a>.</p>
<p>The post <a href="https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/">&#8220;Goldoson,&#8221; an Android Malware, Invade 60 Applications on Google Play</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">84237</post-id>	</item>
	</channel>
</rss>
