Are you confident that your messages are safe? Think twice. You could become a victim of one of the most dangerous digital schemes, all with just one click. Keyword: fake apps!

Introduction to the digital mastermind: The hacker group GREF

If you haven't heard of GREF yet, you should listen up now. This hacker group with roots in the Middle Kingdom has managed to break into what is probably the most secure space in your digital life: your private messages. And how? With a sophisticated fake app strategy.

Fake apps: The wolf in sheep’s clothing strategy

Open source apps like Signal or Telegram have become companions in our daily lives for all of us. However, it is precisely this openness that makes it an ideal playground for hackers. Imagine downloading an app that looks and feels exactly like the original. But there is malicious code hidden in the background. It's just waiting to be activated. Signal Plus Messenger and FlyGram are two such app stealth bombers that trap unsuspecting users.

The spy apps offer the same functions as the original apps: users can use them to write messages and send pictures without raising suspicion. Both apps were removed from the Google Play Store after being discovered by ESET. However, they are still available in the Samsung Galaxy Store.

Screenshot apps, image: welivesecurity
Screenshot apps, image: welivesecurity

The extent of the threat

Android devices around the world are affected. From Europe to Australia to South America and beyond, no one is immune. Germany and Poland are in focus. But other countries are not spared either. But what's really alarming is the fact that this malware already has a history. In China it was used against Uyghurs and other minorities. This shows how far hackers will go to get our data.

Countries affected by Signal Messenger Plus and FlyGram

Detection telemetry, image: welivesecurity
Detection telemetry, image: welivesecurity

How you can protect yourself

Well, everything is not as dark and scary as it seems. In fact, there are a number of measures you can take to protect yourself. Be careful who you download apps from and always be clear about the source of the apps. Don't blindly rely on app stores. And above all: invest in security software, including for your cell phone.

Conclusion: A digital wake-up call

What we can learn from “Messenger Gate”: Our digital world is not as secure as we think. We must remain vigilant, check our sources and protect ourselves from threats in cyberspace. At stake are our data, our privacy and ultimately our freedom. It's up to us to stay informed and make smart decisions as we navigate the digital landscape.

To stay up to date on these and other alerts, sign up for the Mimikama newsletter . Mimikama media education offering also offers deeper insights into the media world and helps you stay safe and informed.

Source:

welivesecurity


If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:

📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.

Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!

* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!


Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )