Coin Miner Mobile Malware Returns, Hits Google Play
By Jason Gu, Veo Zhang, Seven Shen The efficacy of mobile devices to actually produce cryptocurrency in any meaningful amount is still doubtful. However, the effects on users of affected devices are clear: increased device wear and tear, reduced battery life, comparably slower performance. Recently, we found that apps with malicious cryptocurrency mining capabilities on […] more…Ztorg: money for infecting your smartphone
This research started when we discovered an infected Pokémon GO guide in Google Play. It was there for several weeks and was downloaded more than 500,000 times. We detected the malware as Trojan.AndroidOS.Ztorg.ad. After some searching, I found some other similar infected apps that were being distributed from the Google Play Store. The first of […] more…PUA Operation Spreads Thousands of Explicit Apps in the Wild and on Legitimate App Stores
One of the most popular ways to make money online is through pornography—whether through legitimate distribution or different online scams. Last year we detected a new variant of the Marcher Trojan targeting users through porn sites, and the year before that popular porn apps were used as lures to compromise millions of mobile users in […] more…TorrentLocker Changes Attack Method, Targets Leading European Countries
The TorrentLocker ransomware, which has been in a lull as of late, has recently come back with new variants (Detected by Trend Micro as Ransom_CRYPTLOCK.DLFLVV, Ransom_CRYPTLOCK.DLFLVW, Ransom_CRYPTLOCK.DLFLVS and Ransom_CRYPTLOCK.DLFLVU). These new variants are using a delivery mechanism that uses abused Dropbox accounts. This new type of attack is in line with our 2017 prediction that […] more…How To Prevent Ransomware (and Leprechauns) From Locking Up Your Data
St. Patrick’s Day is right around the corner, but before you crowd into your local pub and raise a green pint in honor of the Irish patron saint, keep an eye out for mischievous leprechauns… a.k.a: cybercriminals. No pot of gold is safe: including your company data. Leprechauns may be the stuff of folklore, but […] more…Lurk: Retracing the Group’s Five-Year Campaign
by Fyodor Yarochkin and Vladimir Kropotov (Senior Threat Researchers) Fileless infections are exactly what their namesake says: they’re infections that don’t involve malicious files being downloaded or written to the system’s disk. While fileless infections are not necessarily new or rare, it presents a serious threat to enterprises and end users given its capability to […] more…More information
- RSAC: Innovation Sandbox Presents Ten of the Best
- Apple Says iPhones Will Finally Get USB-C Ports
- Sony says ‘high traffic’ downs PlayStation, Entertainment networks
- Safari alternatives: 12 smart iOS browser options
- Adapter kit allows Kinect for Xbox One sensors to work with Windows 8
- Resolved: ANGEL Assessments at the Pollock Testing Center Unavailable
- Minnesota woman fined $222,000 for 24 illegal song downloads
- A hackable election: 5 things you need to know about e-voting machines
- Empty DDoS threats earn extortion group over $100,000
- Australian Red Cross Leaks Blood Donor Data