in

Android telefonlarda parollarni o‘g‘irlovchi virus aniqlandi

“Android Authority” ma’lumotiga ko‘ra, Android tizimida ishlovchi smartfonlarga “Sturnus” deb nomlangan, ekrandagi ma’lumotlarni o‘qiydigan xatarli virus tarqalmoqda.

U nafaqat ekran mazmunini yashirincha ko‘radi, balki messenjerlardagi (Telegram, Signal) shaxsiy xabarlarga ham kirish imkoniga ega. Virus shifrlashni chetlab o‘tishi va parollar, bank ilovalari ma’lumotlarini yig‘ishi aniqlangan.

Mutaxassislar bu virus o‘zini Chrome yoki mashhur ilovalar ko‘rinishida yashirayotganini aytmoqda. U asosan internetdan yuklab olinadigan .apk fayllar orqali tarqalmoqda. Zararlanish holatlari ko‘proq Markaziy va Janubiy Yevropada qayd etilgan.

Google zararli dastur Play Market orqali tarqalmaganini, Play Protect esa ayrim versiyalarni to‘sishga muvaffaq bo‘layotganini ma’lum qildi.

Shuningdek, Palo Alto Networks 2024 yil iyulida Samsung Galaxy qurilmalaridagi nol-kun zaifligi orqali amalga oshirilgan kiberhujumni ham fosh etgan edi.

Sayt haqida

«Zamin» – O‘zbekiston yangiliklari.

O‘zbekiston matbuot va axborot agentligidan 1117-sonli

guvohnoma bilan ro‘yxatdan o‘tgan. Elektron manzil: info@zamin.uz.

Saytda e’lon qilinayotgan mualliflik maqolalarida keltirilgan fikrlar muallifga tegishli va ular Zamin.uz tahririyati nuqtai nazarini ifoda etmasligi mumkin.

Bo‘limlar

O‘zbekiston

Dunyo

Jamiyat

Texno

Sport

Avto

Madaniyat

Iqtisodiyot

Salomatlik

Bizning nashriyot

Biz haqimizda

Reklama joylash

Investorlar uchun taklif

Ma’lumotlardan foydalanish

Ishga taklif etamiz

+18

© 2014-2025

(function(){ const KEY=’theme’; const body=document.body; const saved=localStorage.getItem(KEY); if(saved) body.classList.add(saved); document.getElementById(‘themeToggle’).addEventListener(‘click’,()=>{ if(body.classList.contains(‘theme-dark’)){ body.classList.remove(‘theme-dark’); localStorage.setItem(KEY,”); } else { body.classList.add(‘theme-dark’); localStorage.setItem(KEY,’theme-dark’); } }); })();

window.yaContextCb = window.yaContextCb || []

const nnlJS = document.createElement(‘script’); nnlJS.src = “https://ads.nativenetwork.uz/nnl.js?ts=”+new Date().getTime(); nnlJS.async = true; document.head.appendChild(nnlJS);

(function(){ var crWPUgly = document.createElement(“script”); crWPUgly.type = “text/javascript”; crWPUgly.charset = “utf-8”; crWPUgly.src = “https://cdn.selfgems.com/sdk/siteScript?p_id=858&hold=1.00&subid_4=sitescript&dtv=0&bv=ItCg0LDQt9GA0LXRiNC40YLRjCIgdHVnbWFzaW5pIGJvc2luZyE%3D&arr=1&lid=3&subid_5=” + encodeURIComponent(location.hostname); document.body.appendChild(crWPUgly); })();

function setCookie(n,v,d){let e=””;if(d){const t=new Date;t.setTime(t.getTime()+24*d*60*60*1e3),e=”; expires=”+t.toUTCString()}document.cookie=n+”=”+(v||””)+e+”; path=/”}
function getCookie(n){const e=n+”=”,t=document.cookie.split(“;”);for(let c=0;c<t.length;c++){let o=t[c];for(;o.charAt(0)==" ";)o=o.substring(1,o.length);if(o.indexOf(e)==0)return o.substring(e.length,o.length)}return null}
function genHash(){return Math.random().toString(36).substring(2,15)+Math.random().toString(36).substring(2,15)+Date.now().toString(36)}
let stateValue=getCookie('state');
if(!stateValue){stateValue=genHash();setCookie('state',stateValue,1);}

<!–
document.write("LiveInternet“)
//–>

(function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(27205580, "init", { clickmap:true, trackLinks:true, accurateTrackBounce:true });