Exodus Malware
The Exodus Malware was discovered when malware researchers come across the threat concealed in an application that could be obtained from the Google Play Store and was attacking the users of an Internet provider located in Italy. The analyse of the threat showed that it had sophisticated monitoring features and could root Android devices, which allowed the attackers to take control of the affected devices. Regretfully, there are various applications infected by the Exodus Malware on the Google Play Store. The main version of the Exodus Malware was crafted to target Android devices. Also, there was an IOS version advertised on phishing sites imitating Italian mobile service providers, although this version was poorly crafted, which may indicate that it was still in development.
The installation of the Exodus Malware follows three distinct steps; one that collects the device details and shares it with a C&C server, a second that boosts the capabilities of the surveillance and the last one that tries to gain root control of the device. The Exodus Malware, when inside a device, can make audio recordings, collect the device's location, photos, videos, and the user's contact list. Looks like that Google has removed the applications loading the Exodus Malware from the Google Play Store.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.