![]() ![]() If NoxPlayer detects a newer version of the software, it prompts the user with an option to install it. They also assert that BigNox’s HTTP API infrastructure (), used for requests and responses between the clients and BigNox servers, may have been compromised as well.Ī normal NoxPlayer update process works as follows: Upon launch NoxPlayer queries the update server via the BigNox HTTP API () in order to retrieve specific update information. Researchers claim that the attack vector stems from NoxPlayer’s update mechanism. They said they have “sufficient evidence” to show that the BigNox infrastructure () was compromised to host malware. “However, based on the compromised software in question and the delivered malware exhibiting surveillance capabilities, we believe this may indicate the intent of collecting intelligence on targets somehow involved in the gaming community.” “We were unsuccessful finding correlations that would suggest any relationships among victims,” said Sanmillan. Sanmillan told Threatpost researchers haven’t been able to find the reasons why these individuals were targeted. On the heels of the alleged attack, which occurred January 2021, three different malware families have been deployed – reportedly from tailored, malicious updates – to a very select set of victims. Researchers said, out of more than the 100,000 users in their telemetry that have Noxplayer installed on their machines, only five users received a malicious update, showing the attack is a “highly targeted operation.” These victims are based in Taiwan, Hong Kong and Sri Lanka. “We have also offered our support to help them past the disclosure in case they decide to conduct an internal investigation.” “We have contacted BigNox about the intrusion, and they denied being affected,” said Ignacio Sanmillan, malware researcher with ESET, on Monday. Threatpost has reached out to BigNox for further comment. When contacted by researchers, BigNox denied being affected by the attack. NoxPlayer is developed by BigNox, which is a China-based company that claims that it has over 150 million users worldwide (notably, however, BigNox users are predominantly in Asian countries). They then installed malware onto victims’ devices with surveillance-related capabilities. There are times when performance can be inhibited by bugs, and that is it's only downfall.Researchers allege, attackers have compromised the update mechanism of NoxPlayer, which is software that allows gamers to run Android apps on their PCs or Macs. ![]() In summary, NoxPlayer is a great Android emulator with a variety of helpful tools. ![]() apk files, and a GPS tool to change your devices location (useful for games like Pokémon Go). Tools here include a built-in screen recorder, a drag n' drop tool for importing. We found the tools on the right side of the screen to be very useful. ![]() When things do work, it is a great program. Sometimes apps force close, or the emulator kicks you out of your Google account. In some instances, the Google Play Services freeze up and shut down, forcing you back to the home screen. When you're not already in an app, NoxPlayer can unfortunately be a little buggy at times. However, you'll need a good PC to be able to make the most out of it. This feature makes it stand out when it comes to raw performance power in comparison with other Android emulators. It lets you decide the system resources you'd like to dedicate to it - the more you give it, the better it'll run. Apps run smoothly for the most part, and if your processor supports virtualization technology, you'll be able to get very high frame rates in games. With it, you're able to install and use Android applications from the Google Play Store. Price: $ NoxPlayer is an Android emulator for Windows that can be downloaded for free. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |