What is the com.sec.vsim.ericcsonnsds.webapp?

  • Thread starter Thread starter Android Central Question
  • Start date Start date
Status
Not open for further replies.
A

Android Central Question

used com.sec.vsim.ericssonnsds.webapp

Hi,
this used com.sec.vsim.ericssonnsds.webapp is showing up in my activity. Can someone please tell me what i am using for this to show up?

Thanks!
 
I've been looking every where for information on this. Not just the app, but I've had the same thing happen to my phone since April of 2019 (at least that's when I caught on). I've gotten several new phones since then and they're all fine at first, then some how they get hacked. I'm assuming it's someone close to me.
I finally noticed after waking up one morning, when I got a developer warning/notification that said "An SD card was inserted with write permissions". Sure enough, I found an SD card in my phone that I didn't put in there. I assume it happened while I was sleeping.
Then I took it to Tmobile and they showed me my developer options had been turned on (I didn't turn it on as I'd have no reason to do so). And when I accidentally tried unlocking my network while trying to figure out what was going on, I had to call Tmobile to fix it and they needed my IMEI in order to do so. I gave it to them and they told me that there was 2 IMEI numbers registered to my phone. I have an s10+ and it's a single sim. So there should only be one IMEI registered to it. Tmobile even said it's strange and they've never seen that before, but also pointed out that my data skyrocketed to over 100GB a month around the same time this started.
A Microsoft office account keeps randomly appearing on my phone even though I constantly remove it and don't use Microsoft. When I try to disable certain apps, it tells me to deactivate admin. But there's no device admin apps on my phone.

I'm starting to think someone linked a fake IMEI to my phone and registered it in knox enrollment/enterprise as an employee phone in order to have access to and control what I'm able to do.

Have you found any other info on this yet or have you also experienced this? I'm sorry I couldn't be of more help with your question, but I hope some of the information I provided helps you get closer to figuring it all out.

I'm having the same problem with my phone. Did you ever get it figured out.
 
I actually have experience with this. This is a highly secret hack used by criminal organizations that is highly sophisticated. Law enforcement doesn't even know about this. I managed to remove it off my phone. There was a time I was involved in gang activity and they basically take over your identity and watch every move you make, who you speak to, and usually become or are the target of harassment. The phones are completely wired and the evidence is hidden so well so as not to alarm the traditional user or the companies who are selling the phones. There has been an upgrade in the level of sophistication with these hacks to the point that they have a completely hidden profile embedded within the phone that hides behind the graphical user interface of an otherwise seemingly perfectly normal version of the device. I believe they are spoofing a normal GUI Profile while keeping the root capabilities of the device off limits as is normally found with phones from Samsung/Providers. The hackers and conglomerate behind these hacks have greater than zero-day hacks that can literally be plugged into cellular devices via USB and even Bluetooth connections AUTOMATICALLY without another user having to push any buttons on their phone. The files that are injected take over the host device silently and the only noticeable effects that I have been able to witness personally is a System UI crash or error. The script/files injected to the device take over extremely quickly and are completely undetected by all Anti-virus programs. I have only been able to identify fragments of the files injected using various means and have never been able to find the actual initial payload script that allows for this. I believe whole heartedly that NTFS/FAT/exFAT file systems which are typically used with media devices have an unknown file system that has been developed in the black market or government secret ops that can and does store files and payloads in a separate filesystem that is not and can not be wiped using typical formatting of media devices. (The newer versions of this no longer use the microsoft accounts on the profile the user uses as the root user is hidden 100% in an embedded portion of the device) I have seen evidence that leads to Huawei Technology designed for Apple that doesn't publicly exist for Windows that essentially delivers a payload to the C: NTFS/FAT/exFAT partition -> C:\.file_safebox note the period in the file name that creates some type of encrypted un-deletable partition or storage container on infected drives in which delivers the payloads to any connected device including PC's, Phones, and anything you can imagine. Having developer options selected or not the technology is able to bypass all known security measures on nearly any device and is not using the same rules or file storage system that anyone even knows about at this moment in time because of it's purposeful nature to infiltrate and have global control of the entire world (Notably this other filesystem has been designed in such a way that it can contain files and can transfer them to the NTFS/FAT/exFAT file partitions with ease). This issue needs to be raised to the highest level of government / the Department of Defense because I personally believe it is either their intention and if it isn't then it is the nefarious efforts of China, which aligns with the USA/CAN rejection of Huawei technologies as of recent global events. Imagine, having every device in the world under control without any person being the wiser it would be the greatest take over of humanity and they wouldn't even know it. The only reason I know this is because the malware I came into has done the exact same thing to my Computers and through my research I have found out this information and seen the way that these unknown and unheardof technologies are spreading like wildfire. I have known and been studying/researching it for over 4 years now and have yet to find the initial payload script that is capable of such surveillance because it is working outside of visible GUI interfaces that are known and developed.

Call me a conspiracy theorist but I have first hand knowledge and experience hunting this technology down. The best magic tricks are ones you don't even see happening. Awareness is everything.
 
Re: used com.sec.vsim.ericssonnsds.webapp

Welcome to AC!

This 2018 thread has ran it's course , we are not a hack forum .


[Thread closed]
 
Status
Not open for further replies.

Forum statistics

Threads
957,907
Messages
6,974,883
Members
3,163,936
Latest member
alyssadrysdale