Welcome To aBlackWeb

Time Travel




hqdefault.jpg
 
It has nothing to do with the effects they use man. Catch up.
 
I can see you already been got got out here. Lol.
Nah, not at all. I'm just not seeing what nefarious acts can be done with FaceApp that can't be done with any other app we happily give our data to.

But please, expound on the additional risks this app brings so I may be educated. Is this the only app from Russia on the app store?

Full disclosure, I deleted the app after I took my pic cause that's all I wanted it for. I know if there was any risk of harm it's already done, but I didn't delete because of any risk.
 
Now that it's been discovered Russia was behind this app and folks willing gave access to they private info I'm seeing a lot of this
dTcAHZc.jpg
151130
 
Last edited:
Nah, not at all. I'm just not seeing what nefarious acts can be done with FaceApp that can't be done with any other app we happily give our data to.

But please, expound on the additional risks this app brings so I may be educated. Is this the only app from Russia on the app store?

Full disclosure, I deleted the app after I took my pic cause that's all I wanted it for. I know if there was any risk of harm it's already done, but I didn't delete because of any risk.

remote access to your phone can be set up and maintained even if you've deleted the app. The app can drop a payload during the installation that will set up remote access to a command and control server. The app will then send a single packet to the server at a set interval (i.e. every 10-15 minutes) just to let the C&C server know it's alive and ready. When the time comes, the individual (or group) behind all of it can then activate the payload for any number of things, screenshots, activate your camera, pull files from the device, push files to it, alter things like DNS settings to point to their servers, etc.

One of the tools I use for network security, Metasploit, has the ability to create payloads like that and wrap them in a number of different ways.
 
remote access to your phone can be set up and maintained even if you've deleted the app. The app can drop a payload during the installation that will set up remote access to a command and control server. The app will then send a single packet to the server at a set interval (i.e. every 10-15 minutes) just to let the C&C server know it's alive and ready. When the time comes, the individual (or group) behind all of it can then activate the payload for any number of things, screenshots, activate your camera, pull files from the device, push files to it, alter things like DNS settings to point to their servers, etc.

One of the tools I use for network security, Metasploit, has the ability to create payloads like that and wrap them in a number of different ways.
so who do we find it on our phones since no one else asked
 
Back
Top