WhatsApp Pink Malware Now Replaying Signal or Telegram Text Messages!

Another version of WhatsApp malware is occupied as WhatsApp Pink which is now updated and having the advanced capabilities that authorized and counterfeit the Android application that automatically responding to Telegram, Viber, Signal, and Skype messages.

 WhatsApp Pink malware was identified this week and now targeting the WhatsApp users located in India. The application looks like an as pink or green themed version of WhatsApp, and it contains a trojan that penetrates your Android device and transmitted it to other users.

How this WhatsApp Pink Malware Spreads?

The security researcher Rajshekar Rajaharia already warned the WhatsApp users about this malware which was circulating over the WhatsApp Group messages that contain the links of different malware sites.

WhatsApp Pink Malware Now Replaying Signal or Telegram Text Messages!

Here we also shared how these links look like and as the user clicks on this link, it would be directed towards the download page of WhatsApp Pink apk. The links redirected the users to the application page and download the file named WhatsappPink.apk.

WhatsApp Pink Malware Now Replaying Signal or Telegram Text Messages!

Whereas, this WhatsApp Pink is an infected version of a fake mobile application that was identified earlier this year. The attacker’s updated version of WhatsApp having the auto-reply worm feature. This updated version doesn’t reply to the WhatsApp message, it also received notifications from other messaging applications that would be the reason why this malware is rapidly increasing day by day.

How this New Updated Feature Works?

According to the video demonstration posted by the researchers shows that this new update has also transmitted the malicious WhatsApp Pink application and it is capable of auto-responding to the messages from multiple applications that includes Telegram, Signal, Skype, and Viber.

However, these end-to-end encrypted messaging applications can protect their messages and communications transmitted over the end-to-end encrypted system. The data at transmission can be accessible by the person that holds the device or executing the malware on the device.

This end-to-end encrypted malware is no misunderstood as the protection or compromise against the devices that penetrated by the applications like WhatsApp Pink. As the application is installed on the user’s devices and once the user opens the WhatsApp Pink, the application disappears as it didn’t install on the user device. After that, the infected user will receive the message and they will have to reply while ordering the unwanted cause that may go further.

Users who downloaded the WhatsApp Pink can remove it from the settings and also from the Application Manager submenu and scan their Android device with the Mobile antivirus solution to verify that malware is out or hidden somewhere into your device.

Leave a Reply