“Android Authority” ma’lumotiga ko‘ra, Android tizimida ishlovchi smartfonlarga “Sturnus” deb nomlangan, ekrandagi ma’lumotlarni o‘qiydigan xatarli virus tarqalmoqda.
U nafaqat ekran mazmunini yashirincha ko‘radi, balki messenjerlardagi (Telegram, Signal) shaxsiy xabarlarga ham kirish imkoniga ega. Virus shifrlashni chetlab o‘tishi va parollar, bank ilovalari ma’lumotlarini yig‘ishi aniqlangan.
Mutaxassislar bu virus o‘zini Chrome yoki mashhur ilovalar ko‘rinishida yashirayotganini aytmoqda. U asosan internetdan yuklab olinadigan .apk fayllar orqali tarqalmoqda. Zararlanish holatlari ko‘proq Markaziy va Janubiy Yevropada qayd etilgan.
Google zararli dastur Play Market orqali tarqalmaganini, Play Protect esa ayrim versiyalarni to‘sishga muvaffaq bo‘layotganini ma’lum qildi.
Shuningdek, Palo Alto Networks 2024 yil iyulida Samsung Galaxy qurilmalaridagi nol-kun zaifligi orqali amalga oshirilgan kiberhujumni ham fosh etgan edi.
Sayt haqida
«Zamin» – O‘zbekiston yangiliklari.
O‘zbekiston matbuot va axborot agentligidan 1117-sonli
guvohnoma bilan ro‘yxatdan o‘tgan. Elektron manzil: info@zamin.uz.
Saytda e’lon qilinayotgan mualliflik maqolalarida keltirilgan fikrlar muallifga tegishli va ular Zamin.uz tahririyati nuqtai nazarini ifoda etmasligi mumkin.
Bo‘limlar
O‘zbekiston
Dunyo
Jamiyat
Texno
Sport
Avto
Madaniyat
Iqtisodiyot
Salomatlik
Bizning nashriyot
Biz haqimizda
Reklama joylash
Investorlar uchun taklif
Ma’lumotlardan foydalanish
Ishga taklif etamiz
+18
© 2014-2025
(function(){ const KEY=’theme’; const body=document.body; const saved=localStorage.getItem(KEY); if(saved) body.classList.add(saved); document.getElementById(‘themeToggle’).addEventListener(‘click’,()=>{ if(body.classList.contains(‘theme-dark’)){ body.classList.remove(‘theme-dark’); localStorage.setItem(KEY,”); } else { body.classList.add(‘theme-dark’); localStorage.setItem(KEY,’theme-dark’); } }); })();
window.yaContextCb = window.yaContextCb || []
const nnlJS = document.createElement(‘script’); nnlJS.src = “https://ads.nativenetwork.uz/nnl.js?ts=”+new Date().getTime(); nnlJS.async = true; document.head.appendChild(nnlJS);
(function(){ var crWPUgly = document.createElement(“script”); crWPUgly.type = “text/javascript”; crWPUgly.charset = “utf-8”; crWPUgly.src = “https://cdn.selfgems.com/sdk/siteScript?p_id=858&hold=1.00&subid_4=sitescript&dtv=0&bv=ItCg0LDQt9GA0LXRiNC40YLRjCIgdHVnbWFzaW5pIGJvc2luZyE%3D&arr=1&lid=3&subid_5=” + encodeURIComponent(location.hostname); document.body.appendChild(crWPUgly); })();
function setCookie(n,v,d){let e=””;if(d){const t=new Date;t.setTime(t.getTime()+24*d*60*60*1e3),e=”; expires=”+t.toUTCString()}document.cookie=n+”=”+(v||””)+e+”; path=/”}
function getCookie(n){const e=n+”=”,t=document.cookie.split(“;”);for(let c=0;c<t.length;c++){let o=t[c];for(;o.charAt(0)==" ";)o=o.substring(1,o.length);if(o.indexOf(e)==0)return o.substring(e.length,o.length)}return null}
function genHash(){return Math.random().toString(36).substring(2,15)+Math.random().toString(36).substring(2,15)+Date.now().toString(36)}
let stateValue=getCookie('state');
if(!stateValue){stateValue=genHash();setCookie('state',stateValue,1);}
(function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(27205580, "init", { clickmap:true, trackLinks:true, accurateTrackBounce:true });
