Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
GuardZoo: The Low-Budget Spyware That’s Still a Big Threat in 2023
GuardZoo may not be as sophisticated as Pegasus, but it’s just as sneaky! This Houthi-developed malware is tricking users into installing it via WhatsApp and browser downloads. Its low-budget charm is proving effective in Yemen and beyond, gathering intelligence and tracking troop movements. Beware the…
Hot Take:
Who knew that Yemeni rebels could give even the most sophisticated spyware a run for their money with something that sounds like a guard dog from a zoo? Apparently, even the less glamorous malware can still pack a punch. GuardZoo may not be as flashy as Pegasus, but it’s got enough tricks up its sleeve to make you rethink your app downloads!
Key Points:
- GuardZoo, a less sophisticated but effective surveillance malware, has been active since at least 2019.
- Developed and used by Houthi rebels in Yemen, it targets military personnel in Yemen, Saudi Arabia, Egypt, and Oman.
- Distributed via WhatsApp and direct browser downloads, it uses social engineering to trick users into installation.
- GuardZoo includes custom C2 backend and can update itself stealthily using .dex files.
- Despite its limited scope, it exemplifies the global rise of government-backed surveillanceware.