DoNot Team Strikes Again: Android Malware Tanzeem Targets South Asia!

The DoNot Team APT group is at it again, rolling out new Android malware named Tanzeem to target government and military organizations in South Asia. This digital mischief-maker cleverly uses OneSignal for phishing links. Remember, if you see a chat app with suspicious requests, it might not be your new pen pal!

Pro Dashboard

Hot Take:

Looks like the DoNot Team is back at it again with their cyber shenanigans, rolling out an Android malware that’s less about chatting and more about snooping. It’s like catching someone eavesdropping at a party — except they’re stealing your contacts, texts, and maybe even your cat videos!

Key Points:

  • The DoNot Team, an APT group from India, has been linked to new Android malware named Tanzeem.
  • Tanzeem masquerades as a chat app to trick users into granting accessibility permissions.
  • Once permissions are granted, the app can access call logs, contacts, SMS messages, and more.
  • The malware uses OneSignal to deliver phishing links via notifications.
  • The group targets South Asian government and military organizations.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?