This app is not developed by me. I translated only. All credits goes to its original developer.
Caution: Rooting your phone may void your warranty! So I'm not responsible for any damages. Do it with your own risk!
ROOTMaster application can ROOT your device without PC or any software. Its just an application. But it can ROOT your device & it has many more features.
Features of ROOTMaster
● Without a computer, data cable, bid farewell to the cumbersome procedures, direct phone end ROOT
● A key management system boot entry, improve the speed of the phone up and running
● Phone memory for the system to optimize weight, built-in software to easily uninstall
● Precise management of all software running permissions, more stable and more power
DOWNLOAD [ENGLISH Version]
HOW TO INSTALL:
Download the apk
Install it as normal apk
Open and Click Get Root
Original URL[Chinese]: http://www.mgyun.com/romastersu
SCREENSHOTS:
P.S.: If you update your app, you will lost English language. So I will try to upload English version updates as soon as I can
Forbes discovered had its fingers in multiple surveillance firms, and in one case was accused of helping Turkey spy on its citizens' via internet service providers.Caution: Rooting your phone may void your warranty! So I'm not responsible for any damages. Do it with your own risk!
ROOTMaster application can ROOT your device without PC or any software. Its just an application. But it can ROOT your device & it has many more features.
Features of ROOTMaster
● Without a computer, data cable, bid farewell to the cumbersome procedures, direct phone end ROOT
● A key management system boot entry, improve the speed of the phone up and running
● Phone memory for the system to optimize weight, built-in software to easily uninstall
● Precise management of all software running permissions, more stable and more power
DOWNLOAD [ENGLISH Version]
HOW TO INSTALL:
Download the apk
Install it as normal apk
Open and Click Get Root
Original URL[Chinese]: http://www.mgyun.com/romastersu
SCREENSHOTS:
P.S.: If you update your app, you will lost English language. So I will try to upload English version updates as soon as I can
All best Android Applicatiions Apps APK Games free download directly from our. Romaster APK is very simple and very easy tool for use and it will work secure. CF Auto Root APK App (Latest Version v1.1) Free Download.
The versions aimed at Google's mobile operating system were first discovered in late 2016. Though just a few dozen of 1.4 billion Android devices were infected by Pegasus, and the two samples uncovered dated back to 2014, they still represented a significant find in the 'surveillance-ware' world, according to researchers at Lookout. The firm's vice president of security intelligence Mike Murray wrote the Pegasus campaign against Android was 'one of the most sophisticated and targeted mobile attacks we've seen in the wild.' Lookout investigated the malware, also known as Chrysaor, with Google, just as it collaborated with the University of Toronto's Citizen Lab in uncovering Pegasus for iPhone.
![Root Root](http://i.imgur.com/feLH99k.png)
Like the iPhone version, the Android Pegasus had some advanced features: it could be controlled via SMS and self-destruct if required. The 'highly advanced' tool was also able to grab large amounts of comms data, pilfering messages and call records from WhatsApp, Facebook, Twitter, Skype and Gmail, amongst others, Lookout noted in its report released Monday. It could also control the camera and microphone, as well as carry out keylogging and take screenshots.
READ MORE: This American Surveillance Tool Helped Russians Spy On Androids And iPhones
A killer 'suicide' feature
The 'suicide' self-destruct feature was particularly devilish, helping NSO Group's malware avoid detection for almost three years. 'If it feels like it's going to be found, it removes itself,' said Lookout mobile security researcher Michael Flossman. 'That's why it took so long to find these samples.' Lookout and Google said that though the samples date from 2014, there was evidence the spyware was working on some victim Android phones when discovered in the last few months. All known targets have been alerted.
While the iOS version removed itself if it detected a jailbreak, the Android tool would delete if it couldn't contact command and control servers for a set period of time. Or if certain tools, revealed by 'antidote files,' that could detect the malware were spied by Pegasus, it would disappear. One of the samples, aimed at Samsung phones, removed the manufacturer's system update app to prevent security fixes from disrupting its snooping.
Flossman believes that Pegasus for Android was delivered in a similar fashion to its iPhone equivalent, via an SMS message. 'The various exploits contained in this surveillance-ware would attempt to be run once the app was installed,' Flossman said. 'If these exploits were patched on the target device, Pegasus would still be able to function but with a reduced set of capabilities.' Google said Pegasus never found its way onto the official Play store.
Lookout diagram shows how Pegasus for Android works.
LookoutBut it wasn't clear, in the case of the Android attacks, if any zero-days were used to exploit devices and then install the malware. Instead, a known technique called Framaroot, which uses exploits named after Lord of the Rings characters, was used to 'root' the device, where the attacker gains almost full control over the operating system. Other Android samples may use zero-days, Lookout warned.
Google found most targets were located in Israel, though individuals in numerous countries were targeted, including Georgia, Mexico, Turkey and the UAE.
Google found less than three dozen devices were infected with the Pegasus malware that dates back to 2014, but researchers believe it's still one of the more sophisticated spy tools they've seen targeting Android.
GoogleNSO Group hadn't responded to a request for comment at the time of publication. The company hasn't been in touch with Lookout's researchers about either their Android or iOS findings, said Flossman.
Lookout continues to chase NSO Group's surveillance operations across the world, and Flossman hinted more is coming. 'This is definitely not the final chapter, we believe this report shows several of their components in Android... it doesn't cover their entire toolset.'
Protect yourself
Google recommended a few steps for anyone who is concerned they might be a target: only install apps from legitimate sources, keep devices updates, enable a lock screen and ensure Google's anti-malware Verify Apps tool is turned on.
While Virus Total results showed anti-virus tools weren't widely detecting the malware, extra layers of security may help uncover malicious activity too.