Threat Database Trojans Galileo RCS

Galileo RCS

By GoldSparrow in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 2
First Seen: July 15, 2015
Last Seen: February 14, 2019
OS(es) Affected: Windows

The Galileo Malware is a threat that may be used to gather data from all types of mobile devices. The Galileo Malware has been active for more than a year and may be used to collect data or monitor the activities performed on any mobile device, including Android, BlackBerry, Windows and iOS smartphones. PC security researchers first received word of the Galileo Malware after a message from Italian hackers claimed that they were capable of hacking any smartphone device using the Galileo Malware. The Galileo Malware also may be used to monitor the activities performed on Mac and PC computers and is not only limited to mobile devices. The Galileo Malware was released in late 2013 or early 2014, with the first reports of the Galileo Malware appearing in January of 2014. The Italian hackers responsible for the Galileo Malware have claimed that this threat is capable of breaking through the protection for almost all current platforms, allowing the attacker to obtain data stored on the device.

The Galileo Malware may Perform Various Harmful Actions

The Galileo Malware may break most modern operating system defenses to allow third parties access to the infected device. When the Galileo Malware is installed on a smartphone, the Galileo Malware begins to deliver voice messages, text messages, emails, browsing history, file and other data through invisible mode to the attacker. PC security analysts have also received reports that the Galileo Malware may be used to gain remote access to the infected device's camera and microphone, meaning that the Galileo Malware may be used to monitor the device's user directly. All data gathered by the Galileo Malware is transmitted to a secure RCS server.

According to the hacking team responsible for the Galileo Malware, this program does not affect performance on the affected device and is virtually impossible to find by the user. The Galileo Malware also may be installed remotely. Fortunately, it seems that the Galileo Malware's capabilities are currently being used for good. According to the hacking team responsible for the Galileo Malware they are cooperating with the authorities to use the Galileo Malware in law enforcement. There are currently no plans to distribute the Galileo Malware for public use. It seems that the Galileo Malware is only for sale to governments. Looks like that the Galileo Malware is being used by Mexico, Kazakhstan, Colombia, Uzbekistan, Morocco, Malaysia, Sudan, the United Arab Emirates and Ethiopia. According to the hackers responsible for the Galileo Malware, this tool is only being made available to governments that have no conflicts with the United States or with NATO.

The Galileo Malware's Terrible Potential

PC security analysts have received reports of functions that may be linked to the Galileo Malware that allowed this threat to remain on an infected device even after the device was wiped and reset. Although it is not probable that the Galileo Malware has been leaked to the public, a tool this powerful exists. Threats and powerful data-collecting software like the Galileo Malware have been used by states to carry out attacks on dissidents and third parties and, unfortunately, these powerful state-sponsored threats have eventually leaked to the public and have ended up being used in devastating attacks on individuals and businesses. The potential that the Galileo Malware has to make money and generate revenue is tremendous, especially when one considers the ever increasing role that mobile devices play in people's lives. Because of this, malware researchers around the world recommend that computer users take special precautions to protect their devices from any type of intrusion. Despite its power, the Galileo Threats still have to be delivered in some way to a targeted device. This means that the best protection remains prevention, both by using reliable security software and by learning to spot typical threat delivery techniques.

Trending

Most Viewed

Loading...