Galileo RCS
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 90 % (High) |
Infected Computers: | 2 |
First Seen: | July 15, 2015 |
Last Seen: | February 14, 2019 |
OS(es) Affected: | Windows |
The Galileo Malware is a threat that may be used to gather data from all types of mobile devices. The Galileo Malware has been active for more than a year and may be used to collect data or monitor the activities performed on any mobile device, including Android, BlackBerry, Windows and iOS smartphones. PC security researchers first received word of the Galileo Malware after a message from Italian hackers claimed that they were capable of hacking any smartphone device using the Galileo Malware. The Galileo Malware also may be used to monitor the activities performed on Mac and PC computers and is not only limited to mobile devices. The Galileo Malware was released in late 2013 or early 2014, with the first reports of the Galileo Malware appearing in January of 2014. The Italian hackers responsible for the Galileo Malware have claimed that this threat is capable of breaking through the protection for almost all current platforms, allowing the attacker to obtain data stored on the device.
The Galileo Malware may Perform Various Harmful Actions
The Galileo Malware may break most modern operating system defenses to allow third parties access to the infected device. When the Galileo Malware is installed on a smartphone, the Galileo Malware begins to deliver voice messages, text messages, emails, browsing history, file and other data through invisible mode to the attacker. PC security analysts have also received reports that the Galileo Malware may be used to gain remote access to the infected device's camera and microphone, meaning that the Galileo Malware may be used to monitor the device's user directly. All data gathered by the Galileo Malware is transmitted to a secure RCS server.
According to the hacking team responsible for the Galileo Malware, this program does not affect performance on the affected device and is virtually impossible to find by the user. The Galileo Malware also may be installed remotely. Fortunately, it seems that the Galileo Malware's capabilities are currently being used for good. According to the hacking team responsible for the Galileo Malware they are cooperating with the authorities to use the Galileo Malware in law enforcement. There are currently no plans to distribute the Galileo Malware for public use. It seems that the Galileo Malware is only for sale to governments. Looks like that the Galileo Malware is being used by Mexico, Kazakhstan, Colombia, Uzbekistan, Morocco, Malaysia, Sudan, the United Arab Emirates and Ethiopia. According to the hackers responsible for the Galileo Malware, this tool is only being made available to governments that have no conflicts with the United States or with NATO.
The Galileo Malware's Terrible Potential
PC security analysts have received reports of functions that may be linked to the Galileo Malware that allowed this threat to remain on an infected device even after the device was wiped and reset. Although it is not probable that the Galileo Malware has been leaked to the public, a tool this powerful exists. Threats and powerful data-collecting software like the Galileo Malware have been used by states to carry out attacks on dissidents and third parties and, unfortunately, these powerful state-sponsored threats have eventually leaked to the public and have ended up being used in devastating attacks on individuals and businesses. The potential that the Galileo Malware has to make money and generate revenue is tremendous, especially when one considers the ever increasing role that mobile devices play in people's lives. Because of this, malware researchers around the world recommend that computer users take special precautions to protect their devices from any type of intrusion. Despite its power, the Galileo Threats still have to be delivered in some way to a targeted device. This means that the best protection remains prevention, both by using reliable security software and by learning to spot typical threat delivery techniques.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.