Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.


We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert level we have many kinds of training patterns.

Call Us : +91-771045-0011 | +91-771045-0022

Beware Android Users! Hackers could use “SpyNote” named Trojan to Record Your Calls!


Security Researchers have found “SpyNote” named Trojan on dark web. The Trojan has been leaked its authors in a number of underground forums. Hackers could use this Trojan very soon, to target Android users. This Trojan is capable to record all the “Incoming” and “Outgoing” calls of victim. This is a dangerous Trojan and researchers have no idea, how hackers will distribute it. Hackers are also familiar with the security methods, used by Android. Might be, they could use some new ways to spread it. This Trojan is very harmful because of the following reasons:

  • SpyNote can steal all the text messages of victim.
  • This Trojan has a built-in microphone, that’s why it is capable to record all the Incoming and Outgoing calls of Victim.
  • It can control the camera of infected device SpyNote can also steal contact list of device.
  • Hackers could make fraud calls and can send fraud text messages from the infected devices.


Why and How Hackers will Use This Trojan?

Security Researchers at Palo Alto Networks said, “The malicious code of this Trojan is not depend on the root access of device. At the starting point, it has to install a list of functions and codes but after that it can install itself automatically.” Hackers have used a Windows Application to build at. By using this application, hackers release customized malicious APK packages of this “SpyNote Trojan”. Hackers could spread this Trojan under different names, command servers and icons. Hackers are not using this Trojan in wild yet. Security Researchers are trying to get know about the methods, which hackers can use to distribute this Trojan.


Manual Installation

In this case, criminal needs physical control of the device. He can manually install “SpyNote” in the device and could target the victim. For Example:


Also read: Be Careful Facebook Users! Scammers Are Using Pornographic Images to Hack Your Account!


  • A person can gift you an android phone after installing “Trojan” in it to spy on you.
  • Your colleagues can install Trojan in your device if they know the password of your device.


How to Avoid it?

Cybercriminals mostly use, third party App Stores to spread their malicious applications. Android devices have a feature “Install Apps from unknown Sources”. To avoid these type of Trojans, “Disabled” this feature. By default it is “Disabled” but you need to check it once before installing application from app stores. This is very smart Trojan and it can also bypass security methods used by Google to get place in official “Play Store”.  Make sure, you are using latest version of Android because it has advanced anti-malware functions to block the installation of these type of Trojans.

“Never install applications from third party App Stores because these App Stores are the homes of Malwares”.

Leave a Reply

Email id
Contact No

See more of Cyber Intelligence by logging in.
Connect with cyber security experts,Discover job opportunities,Online Training, Information Security Advisory and lot more.