Cybercriminals are increasingly peddling booby-trapped versions of popular apps such as Skype and Signal that contain surveillanceware. A security intelligence engineer at Lookout, Apurva Kumar, said that one such surveillanceware family that s been spotted using this tactic is Monokle, a sophisticated set of custom Android surveillanceware. Kumar said, looking forward at 2020, she s seeing a steady increase in sophistication of threat actors distributing surveilleanceware particularly as they rely more on device exploits.
Source: https://threatpost.com/fake-skype-signal-apps-used-to-spread-surveillanceware/155053/

