
- #Group malware noxplayer android emulator how to#
- #Group malware noxplayer android emulator software#
- #Group malware noxplayer android emulator download#
“We discard the possibility that this operation is the product of some financially motivated group,” an ESET spokesperson told ZDNet today via email. ESET said BigNox denied having been hacked.
#Group malware noxplayer android emulator how to#
Until today, and based on its own telemetry, ESET said it spotted malware-laced NoxPlayer updates being delivered to only five victims, located in Taiwan, Hong Kong, and Sri Lanka.ĮSET has released today a report with technical details for NoxPlayers to determine if they received a malware-laced update and how to remove the malware.Ī BigNox spokesperson did not return a request for comment.

“Three different malware families were spotted being distributed from tailored malicious updates toselected victims, with no sign of leveraging any financial gain, but rather surveillance-related capabilities,” ESET said in a report shared today with ZDNet.ĭespite evidence implying that attackers had access to BigNox servers since at least September 2020, ESET said the threat actor didn’t target all of the company’s users but instead focused on specific machines, suggesting this was a highly-targeted attack looking to infect only a certain class of users.


#Group malware noxplayer android emulator download#
Using this access, hackers tampered with the download URL of NoxPlayer updates in the API server in order to deliver malware to NoxPlayer users.
#Group malware noxplayer android emulator software#
The attack was discovered by Slovak security firm ESET on January 25, last week, and targeted BigNox, a company that makes NoxPlayer, a software client for emulating Android apps on Windows or macOS desktops.ĮSET says that based on evidence its researchers gathered, a threat actor compromised one of the company’s official API ( ) and file-hosting servers ( ). “We are still investigating, but we have found tangible correlations to a group we internally call Stellera, which we will be reporting about in the near future.A mysterious hacking group has compromised the server infrastructure of a popular Android emulator and has delivered malware to a handful of victims across Asia in a highly-targeted supply chain attack. Until today, and based on its own telemetry, ESET said it spotted malware-laced NoxPlayer updates being delivered to only five victims, located in Taiwan, Hong Kong, and Sri Lanka. Despite evidence implying that attackers had access to BigNox servers since at least September 2020, ESET said the threat actor didn’t target all of the company’s users but instead focused on specific machines, suggesting this was a highly-targeted attack looking to infect only a certain class of users. Using this access, hackers tampered with the download URL of NoxPlayer updates in the API server to deliver malware to NoxPlayer users. ESET says that based on evidence its researchers gathered, a threat actor compromised one of the company’s official API ( ) and file-hosting servers ( ). The attack was discovered by Slovak security firm ESET on January 25, last week, and targeted BigNox, a company that makes NoxPlayer, a software client for emulating Android apps on Windows or macOS desktops.

A mysterious hacking group has compromised the server infrastructure of a popular Android emulator and has delivered malware to a handful of victims across Asia in a highly-targeted supply chain attack.
