{"id":95220,"date":"2026-03-14T07:00:00","date_gmt":"2026-03-14T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=95220"},"modified":"2026-03-14T07:01:27","modified_gmt":"2026-03-14T04:01:27","slug":"a-stealer-whispers-in-chinese-tyre-pressure-sensors-aid-tracking-and-other-cybersecurity-news","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/a-stealer-whispers-in-chinese-tyre-pressure-sensors-aid-tracking-and-other-cybersecurity-news\/","title":{"rendered":"A stealer whispers in Chinese, tyre-pressure sensors aid tracking, and other cybersecurity news"},"content":{"rendered":"<p>We compiled the week\u2019s most important cybersecurity news.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Researchers found a multifunctional stealer with Chinese background audio.<\/li>\n<li>CertiK tallied losses from crypto-ATM scams.<\/li>\n<li>Tyre-pressure sensors enabled vehicle location tracking.<\/li>\n<li>Meta announced tools to protect users.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\">Researchers spot a multifunctional stealer with Chinese background audio<\/h2>\n<p>Researchers at Kaspersky <a href=\"https:\/\/www.kaspersky.com\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/55401\/\">reported<\/a> a new Android malware dubbed BeatBanker. It blends features of a banking trojan and a covert <a href=\"https:\/\/forklog.com\/en\/news\/what-is-monero-xmr\">Monero<\/a> miner, can steal credentials and tamper with cryptocurrency transactions.<\/p>\n<p>Attackers distribute the software as financial apps and Starlink tools on spoofed Google Play websites. The APK uses native libraries to decrypt and load hidden code directly into memory to evade detection.<\/p>\n<p>In some cases, instead of the banking module the software installs an Android remote-access trojan called BTMOB RAT. It gives operators full device control, <span data-descr=\"keystroke logging\" class=\"old_tooltip\">keylogging<\/span>, screen recording, camera access, GPS tracking and credential interception.<\/p>\n<p>Before execution, it performs environment checks to ensure it is not being analysed. A fake Play Store update prompt then appears to obtain permissions for additional payloads. To avoid arousing suspicion, the software delays activity for a time after installation.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-af6a2acc534e0904-8650164942158037.webp\" alt=\"image\" class=\"wp-image-276745\"\/><figcaption class=\"wp-element-caption\">Source: Kaspersky Lab.<\/figcaption><\/figure>\n<p>According to the researchers, the malware uses an unusual method to stay active: it continuously plays a nearly inaudible MP3 of spoken Chinese.<\/p>\n<p>BeatBanker can also mine Monero covertly using a modified version of XMRig 6.17.0. It launches dynamically based on system load and conditions monitored by operators to balance performance and stealth.<\/p>\n<p>The trojan\u2019s activity has been observed in campaigns targeting users in Brazil.<\/p>\n<h2 class=\"wp-block-heading\">CertiK tallies losses from crypto-ATM scams<\/h2>\n<p>In 2025, losses from fraud involving crypto ATMs in the United States reached $333 million. Meanwhile, victim reports received by the FBI rose 33% year-on-year, <a href=\"https:\/\/www.certik.com\/blog\/skynet-crypto-atm-fraud-report\">said<\/a> CertiK analysts.<\/p>\n<p>The US accounts for 78% of the 45,000 terminals worldwide. According to the researchers, crypto-ATM fraud is among the fastest-growing categories of financial crime in the country.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"411\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-1b92ac8201278b76-8650165202106734-1024x411.png\" alt=\"image\" class=\"wp-image-276747\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-1b92ac8201278b76-8650165202106734-1024x411.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-1b92ac8201278b76-8650165202106734-300x121.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-1b92ac8201278b76-8650165202106734-768x309.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-1b92ac8201278b76-8650165202106734.png 1354w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: CertiK.<\/figcaption><\/figure>\n<p>The researchers noted that AI-driven social-engineering schemes in 2025 were 4.5 times more profitable than traditional methods. CertiK also pointed to a shifting fraudster profile: operations are increasingly structured and evolving into transnational criminal organisations.<\/p>\n<h2 class=\"wp-block-heading\">Tyre-pressure sensors used to track cars<\/h2>\n<p>A team of researchers from Spain, Switzerland and Luxembourg <a href=\"https:\/\/dspace.networks.imdea.org\/bitstream\/handle\/20.500.12761\/2011\/Can%E2%80%99t%20Hide%20Your%20Stride_Inferring%20Car%20Movement.pdf\">demonstrated<\/a> a method to track vehicle movements using tyre-pressure monitoring systems (TPMS).<\/p>\n<p>The problem, they argue, is that TPMS transmits data and a unique identifier in the clear, and the ID remains unchanged for the tyre\u2019s lifetime. In effect, each wheel constantly broadcasts a radio signal that can uniquely identify the car.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"617\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-3d8fce287ce6f0db-8650165366120694-1024x617.png\" alt=\"image\" class=\"wp-image-276746\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-3d8fce287ce6f0db-8650165366120694-1024x617.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-3d8fce287ce6f0db-8650165366120694-300x181.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-3d8fce287ce6f0db-8650165366120694-768x463.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-3d8fce287ce6f0db-8650165366120694.png 1142w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: Study: \u201cCan\u2019t Hide Your Stride: Inferring Car Movement from Passive TPMS Measurements\u201d.<\/figcaption><\/figure>\n<p>The paper details an experiment deploying five receivers costing about $100 each.<\/p>\n<p>Over ten weeks, the devices captured more than 6 million TPMS messages from roughly 20,000 vehicles. Because the IDs did not change, the researchers matched signals to specific wheels and traced their routes.<\/p>\n<p>They observed that the data are sent unencrypted\u2014interception requires only a budget receiver and a simple antenna. In their view, attackers could scale the system, link identifiers to individuals and conduct targeted surveillance.<\/p>\n<h2 class=\"wp-block-heading\">Meta announced tools to protect users<\/h2>\n<p>Meta introduced a set of tools to protect users, the company <a href=\"https:\/\/about.fb.com\/news\/2026\/03\/meta-global-law-enforcement-disrupt-major-southeast-asia-criminal-scam-networks\/\">said<\/a> in a press release.<\/p>\n<p>The new measures include:<\/p>\n<ul class=\"wp-block-list\">\n<li>warnings in Facebook when users interact with suspicious accounts;<\/li>\n<li>an alert upon receiving dubious requests in WhatsApp to prevent a scammer from binding an account to their device;<\/li>\n<li>expanded threat detection in Messenger, offering to analyse recent messages for hacker markers using AI tools.<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"892\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-23035301fab309ea-8650165586475838-1024x892.png\" alt=\"image\" class=\"wp-image-276748\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-23035301fab309ea-8650165586475838-1024x892.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-23035301fab309ea-8650165586475838-300x261.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-23035301fab309ea-8650165586475838-768x669.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-23035301fab309ea-8650165586475838-1536x1337.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-23035301fab309ea-8650165586475838.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: <a href=\"https:\/\/about.fb.com\/news\/2025\/10\/cybersecurity-awareness-month-helping-older-adults-avoid-online-scams\/\">Meta<\/a>.<\/figcaption><\/figure>\n<p>Meta also reported blocking more than 150,000 accounts linked to scam centres in Southeast Asia.<\/p>\n<p>Earlier, the company removed more than 159 million scam ads for policy violations and blocked 10.9 million Facebook and Instagram accounts tied to scam centres.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>After Fusaka, the number of address-substitution attacks in Ethereum <a href=\"https:\/\/forklog.com\/en\/news\/ethereum-address-spoofing-attacks-surge-by-600-following-fusaka-update\">surged<\/a> by 600%.<\/li>\n<li>A MediaTek chip vulnerability <a href=\"https:\/\/forklog.com\/en\/news\/mediatek-chip-vulnerability-threatens-cryptocurrency-wallets-on-a-quarter-of-android-smartphones\">put<\/a> crypto wallets on a quarter of Android smartphones at risk.<\/li>\n<li>Binance disclosed details of its investigation into transfers to Iran-linked addresses.<\/li>\n<li>Meta <a href=\"https:\/\/forklog.com\/en\/news\/meta-faces-lawsuit-over-sharing-intimate-videos-from-smart-glasses-with-kenyan-contractors\">handed over<\/a> intimate smart-glasses videos to contractors in Kenya.<\/li>\n<li>US authorities <a href=\"https:\/\/forklog.com\/en\/news\/us-authorities-acknowledge-privacy-rights-of-crypto-mixer-users\">affirmed<\/a> crypto-mixer users\u2019 right to privacy.<\/li>\n<li>Claude Opus 4.5 <a href=\"https:\/\/forklog.com\/en\/news\/claude-opus-4-5-identifies-22-vulnerabilities-in-firefox-within-two-weeks\">found<\/a> 22 Firefox vulnerabilities in two weeks.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">What to read this weekend?<\/h2>\n<p>Graphics cards have become the main compute workhorses for neural networks. As the industry evolves, demand has grown for specialised AI hardware. ForkLog explores the latest phase of the artificial-intelligence arms race.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We compiled the week\u2019s most important cybersecurity news.<\/p>\n","protected":false},"author":1,"featured_media":95221,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"This week's cybersecurity: Android malware, crypto-ATM fraud, TPMS tracking, Meta tools.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-95220","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"123","promo_type":"1","layout_type":"1","short_excerpt":"This week's cybersecurity: Android malware, crypto-ATM fraud, TPMS tracking, Meta tools.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/95220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=95220"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/95220\/revisions"}],"predecessor-version":[{"id":95222,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/95220\/revisions\/95222"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/95221"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=95220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=95220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=95220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}