Chinese Hackers using New Noodle RAT to Attack Linux Servers

0
[ad_1]

Cybersecurity experts have identified a new type of malware called “Noodle RAT,” which Chinese-speaking hacker groups use to target Linux servers.

Although this malware has been active since 2016, it has only recently been properly classified, shedding light on its extensive use in both espionage and cybercrime.

The Emergence of Noodle RAT

Noodle RAT, also known as ANGRYREBEL or Nood RAT, is a backdoor malware with versions for both Windows (Win.NOODLERAT) and Linux (Linux.NOODLERAT).

According to the TrendMicro blog, Despite its long history, it was often misclassified as variants of other malware such as Gh0st RAT or Rekoobe.

However, recent investigations have confirmed that Noodle RAT is a distinct malware family.

Noodle RAT Timeline
Noodle RAT Timeline

The timeline of Noodle RAT’s development and deployment is as follows:

  • July 2016: v1.0.0 for Win.NOODLERAT compiled.
  • December 2016: v1.0.1 for Linux.NOODLERAT compiled.
  • April 2017: v1.0.1 for Linux.NOODLERAT updated.

Multiple reports have documented attacks involving Noodle RAT since 2018, but it was often misidentified as other malware families.

Analyze any MaliciousURL, Files & Emails & Configuration With ANY RUN Start your Analysis

Notably, espionage campaigns using Noodle RAT have targeted countries such as Thailand, India, Japan, Malaysia, and Taiwan since 2020.

Technical Details of Noodle RAT

Win.NOODLERAT

Win.NOODLERAT is a shellcode-formed in-memory modular backdoor. Groups like Iron Tiger and Calypso APT have used it. Its capabilities include:

  • Downloading and uploading files
  • Running additional in-memory modules
  • Working as a TCP proxy
Relations of Win.NOODLERAT with threat groups
Relations of Win.NOODLERAT with threat groups

The malware uses loaders like MULTIDROP and MICROLOAD for installation and employs complex encryption algorithms for C&C communication.

Linux.NOODLERAT

Linux.NOODLERAT, an ELF version of Noodle RAT, has been used by groups such as Rocke (Iron Cybercrime Group) and the Cloud Snooper Campaign. Its capabilities include:

  • Reverse shell
  • Downloading and uploading files
  • Scheduling execution
  • SOCKS tunnelling
Observed execution flow of Linux.NOODLERAT
Observed execution flow of Linux.NOODLERAT

The malware is typically deployed as an additional payload of an exploit against public-facing applications and uses sophisticated encryption algorithms for C&C communication.

Backdoor Commands

Both Win.NOODLERAT and Linux.NOODLERAT implements various backdoor commands. The following table summarizes some of these commands:

ActionsType 0x03A2 (Win)Type 0x132A (Win)Type 0x03A2 (Linux)Type 0x23F8 (Linux)
Successfully authorized0x03A20x132A0x03A20x23F8
Upload a file to C&C server0x390A0x590A0x30x3
List directories recursively0x390A0x590A0x30x3
Download a file from C&C server0x390A0x590A0x30x3
Initiate reverse shell sessionN/AN/A0x10x1

Similarities with Other Malware

Noodle RAT shares some similarities with Gh0st RAT and Rekoobe, but it is distinct enough to be classified as a new malware family.

Algorithm comparison between Gh0st RAT variants and Noodle RAT
Algorithm comparison between Gh0st RAT variants and Noodle RAT

For instance, while it uses some plugins from Gh0st RAT, the core backdoor code is different. Similarly, Linux.NOODLERAT shares some code with Rekoobe v2018, but the rest of its code is unique.

Recent findings have revealed control panels and builders for Noodle RAT, indicating a sophisticated malware ecosystem.

The control panel for Linux.NOODLERAT, named “NoodLinux v1.0.1,” supports TCP and HTTP for C&C protocol and requires a password to open.

Builders for Linux.NOODLERAT, versions v1.0.1 and v1.0.2, help create custom configurations for the malware.

Control panel of Linux.NOODLERAT v1.0.1
Control panel of Linux.NOODLERAT v1.0.1

Noodle RAT has been misclassified and underrated for years.

This new understanding of its capabilities and usage highlights the need for vigilance in cybersecurity, especially for Linux/Unix systems.

As exploitation against public-facing applications increases, Noodle RAT remains a potent tool for threat actors, making it essential for cybersecurity professionals to stay informed and prepared.

Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo


[ad_2]
Source link

Galaxy Z Fold 6 & Flip 6 colors confirmed by reliable tipster

0
[ad_1]

Back in March, Ross Young, a well-known display analyst, revealed the Galaxy Z Fold 6 and Galaxy Z Flip 6 colors that will be on offer. Well, Evan Blass has just reconfirmed those color options via X. He also added some additional info.

The Galaxy Z Fold 6 & Flip 6 colors have been confirmed yet again, by another reliable tipster

When it comes to the Galaxy Z Fold 6, the phone is coming in Navy, Pink, and Silver Shadow colors. The Galaxy Z Flip 6 will launch in Blue, Mint, Silver Shadow, and Yellow colors.

The tipster also mentioned that both models will be offered online in “white and crafted black” colors. The Galaxy Z Flip 6 will also be on offer in a ‘peach’ color online, by the way.

Now, we don’t know if all of these will be official names for the color options. Ross Young did mention the ‘light blue’ color, while Evan Blass simply says ‘blue’ for the Galaxy Z Flip 6. We’re not sure which one is accurate.

The colors with special names such as ‘Silver Shadow’ and ‘Navy’, are probably set in stone, though. Chances are that Evan Blass is entirely accurate here, just keep in mind some color options could have different official names.

Samsung is allegedly planning its second ‘Unpacked’ event of the year for July 10

As many of you already know, both of these smartphones are expected to arrive next month. Samsung is rumored to host an event on July 10 in Paris, even though nothing has been confirmed just yet.

These two foldables are not the only devices that will launch during that press event, though. The Galaxy Ring is also expected, the company’s very first smart ring. Two new smartwatches are coming, and possibly even a set of earbuds.

It will be a packed event either way you slice it. The Galaxy Ring could even take the spotlight, as the Galaxy Z Fold 6 and Flip 6 won’t be much different compared to current-gen models.


[ad_2]
Source link

Galaxy S23 gets June update in the US, May patch in Europe

0
[ad_1]

Yesterday, Samsung released the June security patch for the Galaxy S24 series in the US and South Korea. The same update is now available for the Galaxy S23 series. The update is currently rolling out to the carrier-locked units in the US but should go global soon. The European Galaxy S23 Ultra, meanwhile, is picking up the new firmware build with the May security patch.

The new Galaxy S23 update doesn’t bring the June security patch everywhere

Last month, Samsung rolled out two updates to the Galaxy S24 Ultra and Galaxy S23 Ultra in some markets. The first update was a regular May security patch while the second brought fixes for a video rattling issue and battery optimizations. The company didn’t push the second build globally. We expected it to bundle those fixes with the June patch in other markets.

The June update for the Galaxy S24 series did come with the same build version as the second May release. However, the US models don’t seem to have picked up anything more than the latest security patch. The Korean models, meanwhile, received additional fixes. It is unclear why Samsung didn’t push the same changes globally. Perhaps the issues don’t exist in the US units.

Now, Samsung is rolling out the June security update to the Galaxy S23 series in the US, and—you guessed it right—it’s the same build version. The new update is available for carrier-locked units with the build number S91*USQS3CXE3. The official changelog confirms that the update is all about this month’s security fixes. There aren’t any additional changes in tow.

Surprisingly, the Galaxy S23 Ultra is picking up this firmware build (S918BXXU5CXE3) with the May security patch. It is essentially the second May update we discussed above. Since the June SMR (Security Maintenance Release) is already available, it’s unclear why Samsung didn’t bundle it. The device should pick up another update with the June patch in the coming days.

This month’s security patch for Galaxy devices addresses 59 vulnerabilities

Samsung’s June SMR for Galaxy devices contains fixes for 59 security issues. These include 37 Android OS vulnerabilities and 22 Galaxy-specific security flaws. At least one of these is confirmed to be a critical flaw. The Korean firm will soon push the new SMR to more eligible Galaxy models, including foldables. You can check for updates from the Settings > Software update > Download and install menu on your Galaxy device.


[ad_2]
Source link

Google Drive introduces automatic digest emails so you stay on top of files and activity

0
[ad_1]
Google Drive is a great place to store your files, and it’s now getting a useful new feature that will make sure you’re not missing anything important. Google has now announced a drive digest feature, an option that will send you emails about activity in the app.

Google Drive will be emailing you digests of activity on the app to help you stay on track. Unfortunately, it will email you only if you’ve been inactive on the service for seven days, and also if you have shared files that haven’t been viewed yet. So you can’t benefit from it to get weekly or daily digests if you’re active on the app. The email will contain a small report that will show the unviewed files, and will also have a link that will allow you to “see more activity”.

You can, of course, disable this feature if you happen to find it annoying. You can disable it from Google Drive’s Settings. Tap on Notifications and then deselect the “Get summaries about recent files shared with you via Drive digest” option. The feature has already started rolling out, but Google mentions it will be a slow roll-out, so don’t be concerned if you haven’t gotten it yet. The feature will be available to all Google Workspace customers.

[ad_2]
Source link

Arm Warns Of Mali GPU Kernel Driver Flaws Exploited In The Wild

0
[ad_1]

The Mali GPU driver is a widely used Graphical Processing Unit for multiple devices, including Android and Linux.

A new vulnerability has been discovered in the Mali GPU Kernel driver. It allows an authenticated, low-privileged user to gain access to freed memory. 

The CVE for this vulnerability has been assigned to CVE-2024-4610, and the severity has yet to be categorized.

However, Arm has patched this vulnerability, but there are reports that threat actors are exploiting it in the wild. Arm advises its users to upgrade their Mali GPU drivers to the latest versions.

With ANYRUN You can Analyze any URL, Files & Email for Malicious Activity : Start your Analysis

CVE-2024-4610: Use After Free vulnerability

According to the advisory, this vulnerability is associated with the Use-After-Free condition, which allows an authenticated low-privileged attacker to make improper GPU memory processing operations and thereby gain access to already freed memory. 

This vulnerability is reported to affect the Bifrost GPU Kernel Driver from r34p0 through r40p0 and the Valhall GPU Kernel Driver from r34p0 through r40p0.

Arm has released a security advisory and patch versions to fix this vulnerability on affected versions.

Nevertheless, no additional information about this vulnerability nor the information on who reported this vulnerability was disclosed. 

Users of Mali GPU Kernel Driver such as Bifrost, all versions from r34p0 to r40p0, and Valhall, all versions from r34p0 to r40p0, are advised to upgrade their GPU drivers to the latest version, r49p0, to fix this vulnerability.

Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo 


[ad_2]
Source link

Hackers Weaponizing MSC Files In Targeted Attack Campaign

0
[ad_1]

Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that enable them to perform different administrative tasks on the target system. 

By mimicking legitimate files, MSC files can evade various security properties and access overview and control of the vulnerable system with privileges, consequently resulting in unauthorized access to its data and other malicious deeds.

Cybersecurity researchers at NTT recently identified that hackers are weaponizing the MSC files in targeted attack campaigns.

Hackers Weaponizing MSC Files

In late May 2024, DarkPeony took over the MSC file exploitation already reported on by Kimsuky through Operation Control Plug.

With ANYRUN You can Analyze any URL, Files & Email for Malicious Activity : Start your Analysis

These attacks could have been against military and government organizations in Myanmar, the Philippines, Mongolia as well as Serbia.

By taking advantage of the fact that MSC file abuse is not easily detected and is obscurely carried out, the attackers devised several stages for infection, in which deserves to be looked at

Attack flow (Source – NTT)

Operation Control Plug initiates its attack chain through malicious MSC files that, when opened, display a screen prompting users to click a link executing a PowerShell script. 

This script fetches and runs an MSI package containing a legitimate executable capable of DLL side-loading.

The side-loaded DLL decodes and loads a malicious DAT payload, ultimately deploying the PlugX malware. 

Threat actors abuse the innocuous-looking MSC (Microsoft Common Console Document) format by leveraging its “Console Taskpad” feature to camouflage malicious PowerShell commands as seemingly harmless links, tricking users into enabling the infection sequence.

Websites distributing MSI files with Operation Control Plug may use Cloudflare to control access, presumably to block researchers and analysis engines from accessing the MSI files while distributing them to targeted organizations. 

This article introduced DarkPeony’s Operation Control Plug, which uses MSC files as the starting point of attacks and infects computers with PlugX to carry out intrusions. 

Although there are few attacks using MSC files, they are used by multiple targeted attack groups and may become more active in the future.

Researchers recommend that you verify whether your organization can detect attacks.

IoCs

MSC File

  • 1cbf860e99dcd2594a9de3c616ee86c894d85145bc42e55f4fed3a31ef7c2292
  • 54549745868b27f5e533a99b3c10f29bc5504d01bd0792568f2ad1569625b1fd
  • f0aa5a27ea01362dce9ced3685961d599e1c9203eef171b76c855a3db41f1ec6
  • 8c9e1f17e82369d857e5bf3c41f0609b1e75fd5a4080634bc8ae7291ebe2186c
  • e81982e40ee5aaed85817343464d621179a311855ca7bcc514d70f47ed5a2c67

MSI File Download Site

  • versaillesinfo[.]com
  • lifeyomi[.]com
  • profilepimpz[.]com
  • lebohdc[.]com

PlugX C2 Server

  • shreyaninfotech[.]com
  • buyinginfo[.]org
  • gulfesolutions[.]com

Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo 


[ad_2]
Source link

No more waiting until December: Spotify’s new feature delivers Wrapped-like stats all year

0
[ad_1]
Spotify, one of the world’s top music streaming services with over 615 million users, is well-known for its personalized experience and features like the end-of-year Wrapped. Now, the company is enhancing this experience with the new My Spotify.

Spotify’s newest feature is like having Wrapped all year long


The Swedish company announced that users will notice new home page banners and personalized app messages highlighting their My Spotify listening habits. The rollout of My Spotify will kick off in the US, Canada, UK, Ireland, Australia, and New Zealand over the next few weeks.

– Marc Hazan, VP of Marketing and Partnerships at Spotify, June 2024

Listeners will spot new banners and personalized messages revealing their listening habits. They can dive into unique Spotify features like daylist, DJ, Blend, Daily Mix, and the Made For You hub – a go-to spot packed with playlists, podcasts, features, and recommendations tailored just for them.

The new feature is all about your personal listening habits. Screenshots from Spotify show various banners, like one saying, “Last month you listened to Doja Cat 58 times,” and encouraging you to check out a curated Doja Cat mix. Another screenshot suggests a DJ mix of Go Gina because you played her tracks multiple times last month.

The new campaign is open to everyone, not just Premium subscribers. However, it is still unclear when it will roll out to countries beyond the ones already mentioned above.

Introducing new features like this is a smart move for Spotify, especially after the recent subscription price hike. In the US, Spotify Premium is set to increase by $1, bringing the monthly cost to $12, starting next month.

[ad_2]
Source link

Hackers Used Homemade Mobile Antenna To Send Smishing Text

0
[ad_1]

Officers have made two arrests in connection with using a “text message blaster,” believed to have been used to send thousands of smishing messages posing as banks and other official organizations.

These messages targeted unsuspecting members of the public.

Unprecedented Use of Illegitimate Telephone Mast

In what is considered the first case in the UK, an illegitimate telephone mast was allegedly used as an “SMS blaster.”

This device enabled the perpetrators to send messages that bypassed mobile phone networks’ systems to block suspicious text messages.

Analyze any MaliciousURL, Files & Emails & Configuration With ANY RUN Start your Analysis

According to City of London Police blogs, The first arrest was made on May 9 in Manchester, followed by a second on May 23 in London.

Huayong Xu, 32, of Alton Road, Croydon, was charged on May 23 with possession of articles for use in fraud and was remanded in custody.

He is scheduled to appear at Inner London Crown Court on June 26. The other arrested individual was released on bail.

The Dedicated Card and Payment Crime Unit (DCPCU) officers collaborated with mobile network operators, Ofcom, and the National Cyber Security Centre (NCSC) to tackle this sophisticated crime.

Temporary Detective Chief Inspector David Vint, head of the DCPCU, emphasized the increasing complexity of such fraudulent activities.

“The criminals committing these types of crimes are only getting smarter, working in more complex ways to trick unknowing members of the public and steal whatever they can get their hands on. It is vital we work with partners to help prevent the public from falling victim to fraud,” said Vint.

Vint also provided crucial advice to the public, reminding them that banks or other official authorities will never ask for personal information via text or phone.

He urged anyone who receives a suspicious text message to report it by forwarding it to 7726.

Steps to Protect Yourself from Phishing Text Messages:

  1. Report Suspicious Texts: Most phone providers allow customers to report suspicious text messages for free by forwarding them to 7726. This enables providers to investigate and potentially block the sender if found to be malicious.
  2. Immediate Action if Scammed: If you’ve lost money or provided financial information due to a phishing scam, notify your bank immediately and report it to Action Fraud at actionfraud.police.uk or by calling 0300 123 2040. In Scotland, contact Police Scotland on 101.

This case highlights the evolving tactics of cybercriminals and underscores the importance of public vigilance and inter-agency cooperation in combating fraud.

Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo


[ad_2]
Source link

180-degree security camera: Explore top picks

0
[ad_1]

180-degree security cameras cover a massive area, which is the reason they are preferred for video surveillance.

In this article, we will discuss what a 180-degree camera is and how does it works. We will explain their types and some important factors you need to consider while buying them. We have also hand-picked some of the best cameras to save you time.

What is a 180-degree IP camera?

A 180-degree IP camera offers 180-degree field of view. It covers a wider area, which is why you need fewer cameras for surveillance.

Some of these cameras can pan and tilt over a range, while some cameras have dual lenses, and the final image of both lenses is combined through a stitching algorithm. That’s how you get a 180-degree field of view.

Other than that, all features are almost similar to common IP cameras.

Types of 180 Degree Security Camera

We can categorize 180-degree security camera on the basis of their usage, wiring, and lens type. Let’s see how they differ.

Indoor vs. Outdoor 180 Degree Security Cameras

Indoor security cameras are used to monitor babies, pets, and the elderly. They are also great for keeping an eye on the kids. They are specifically designed for indoor purposes. They might lack weatherproofing, warning & alarm systems, etc.

On the other hand, outdoor 180-degree cameras cover a massive outdoor area. They can withstand weather conditions, deter intruders, etc.

Wired vs. Wireless 180 Degree Wide Angle Security Camera

Wired 180-degree cameras require wire for power and networking. If it’s a PoE camera, you need an Ethernet cable. If it’s a Wi-Fi camera, you need to connect it to a nearby AC supply.

Wireless 180-degree cameras are battery-powered, and they last for a long time after full charge. Secondly, they use Wi-Fi or 4G for networking, so no wire is needed. They are easier to install.

Panoramic vs. Fisheye 180 Degree Camera

Panoramic cameras capture images through multiple lenses, and finally, the image is joined to create a 180-degree view. There is minimal distortion, and the resolution is exceptional.

On the other hand, fisheye cameras offer a wider view, which looks oval or circular. You will experience more distortion and lower resolution. However, they eliminate blind spots.

What to Consider When Choosing 180 Degree Security Cameras

Here are some important factors and features to consider while selecting a 180-degree security camera.

Image Quality

For clear images and exceptional details, you should go with a 4K security camera. It unveils intricate details, such as license plates and facial features.

Night vision is a must to capture clear images at night and in low-light conditions. You can go with colored and black-and-white night vision, and some cameras offer both.

Field of View

Check the field of view to ensure the camera offers a 180-degree view. If it is a pan and tilt camera, you can check the range of the movement.

Smart Detection

The camera should have smart detection to detect animals, vehicles, and persons. It should send instant and accurate alerts to your devices.

Durability and Weather Resistance

The build quality of the camera should be excellent to last for a long time and prevent tampering and damage. It should also prevent water and dust from getting into it and perform in all weather conditions.

Best 180 Degree Security Camera Recommendation

After careful evaluation, we have hand-picked some of the best 180-degree security cameras you try for optimal security.

Reolink Argus 4 Pro

Reolink Argus 4 Pro is a state-of-the-art dual-lens camera that records 180⁰ super wide view. It gathers more details in one frame and helps you cover a wider area. It is equipped with Reolink ColorX technology that contains an F1.0 aperture to capture more light at night and offer better videos with extra illumination.

Key Features:

4K UHD 180° Blindspot-Free View: The dual-lens design of the Argus 4 Pro captures a wide area with its 180° field of view, ensuring no blind spots are left.

Color Vision Day and Night: The advanced sensor and large aperture lens ensure vibrant colors and sharp images throughout the night, significantly enhancing nighttime surveillance capabilities.

30% more battery life: The Argus 4 Pro’s use of ColorX technology not only enhances night vision capabilities but also significantly improves energy efficiency. By avoiding the typical power consumption associated with infrared night vision cameras, it saves up to 2 watts per hour.

Wi-Fi 6 Ready, Smooth 4K Streaming: With its fast speed and uninterrupted connection, elevate your home security to a new level without any limitations.

Enhanced Smart Detection with Accurate Alerts: Argus 4 Pro features a 180° ultra-wide-angle PIR sensor, perfectly complementing its wide field of view for comprehensive detection.

Reolink image 0181209834

Reolink Duo 3 PoE

Duo 3 is a PoE camera for 24/7 continuous surveillance. It contains a dual lens to capture a 180⁰ panoramic view. It summarizes a 15s video in one picture to give you more details in a frame. It can smartly detect persons, vehicles, and pets and even deter intruders through the warning system.

Pros:
– 4K 16MP offers incredible details in the videos
– Flexible and versatile storage options
– Dual night vision to work in all scenarios
– Wider cover with motion tracking

Cons:
– Need to wire Ethernet

Reolink image 0181209831

Reolink Go PT Ultra

This is a standalone camera ideal for remote locations. It is completely wireless and does not require Wi-Fi. You need to insert a SIM card for 4G, and it can be powered using a small solar panel. It offers a wider pan and tilt range to offer 360⁰view with incredible clarity.

Pros:
– Offers smart detection and double-warning
– Battery lasts for a long time
– Works in all weather conditions
– Dual night vision modes
– Easy to install

Cons:
– Weatherproof but not IP-67 rated

Reolink image 0181209833

FAQs

1. Do security cameras have 180-degree view?

Not all security cameras offer a 180-degree view. For that, there must be an appropriate lens or multiple lenses. Some cameras also capture a 180-degree view through pan and tilt movements.

2. How do 180-degree cameras work?

180-degree cameras have more than one lens, so each captures a different image. Finally, the images are joined through an algorithm to create a 180-degree view. However, some cameras need to rotate left, right, up, and down to capture a wider view.

3. What is the maximum angle of a CCTV camera?

The maximum angle of most CCTV cameras is 180 degrees. But some cameras also offer a 360-degree field of view through pan and tilt movements.

Conclusion

180-degree cameras cover a wider area compared to the common ones. If you install these, you will need fewer cameras, and you can capture more details in one frame. We have explained the important factors you need to consider while buying these cameras. If you want to save time, you can consider the recommendations we have shared. These hand-picked 180-degree cameras offer optimal security with advanced features.


[ad_2]
Source link

Google’s testing a dark mode feature for websites in its iPhone app

0
[ad_1]
Google Search Labs is a program that allows users to try out and provide feedback on new, experimental features for Google Search. It is basically a way for Google to get real-world input on how people interact with and respond to potential changes to the search experience. And while lately, Search Labs primarily focuses on generative AI, Google also experiments with various features, such as Auto Dark Mode on the iPhone.According to 9to5Google, a reliable source for Google news, the tech giant’s Google app on iOS is testing a new Search Labs experiment. This feature lets users enable dark mode on any website they visit or:


Just so you know, the Google app on iPhone works like a browser with its own tab system. If you are part of the Labs program, once you enable the experiment, Auto Dark Mode kicks in for all compatible websites by default. You can easily switch it off using a new sun icon in the address bar on the right.


In the screenshots from the source, its site is shown in light mode first. The second image shows the native night theme, and the last one displays Google’s Auto Dark Mode. This mode is mostly gray, not pure black.


Google warns that:

Auto Dark Mode is only available in the iOS Google app and isn’t showing up on Android yet. Of course, just because Google is testing this feature doesn’t mean it is a sure thing. However, given the stats and user preferences, it’s likely we will see a broader rollout of Dark Mode in the Google app.


Dark mode is becoming the go-to for mobile users, and Google is definitely paying attention. Stats show that dark mode usage has increased by 47% since Android and iOS introduced system-wide options. Plus, over 80% of mobile users say they prefer dark mode because it helps reduce eye strain.

[ad_2]
Source link