Home Tags Cybercriminals

Tag: cybercriminals

At the beginning of October 2017, we discovered new Android spyware with several features previously unseen in the wild.
In the course of further research, we found a number of related samples that point to a long-term development process. We believe the initial versions of this malware were created at least three years ago.
Cybercriminals distribute malicious email attachments purportedly coming from three common brands of network printer-scanner devices.
Cybercriminals narrow their focus on specific industries, geographies, or size for a better return on investment, security experts say.
In an earlier publication we noted that cybercriminals were making use of social engineering to install this sort of software on usersrsquo; computers.

This time, wersquo;d like to dwell more on how exactly the computers of gullible users start working for cybercriminals.
New Trojans appeared, old ones resurfaced, and delivery methods evolved as cybercriminals set their sights on financial data.

Jack of all trades

Among this array of threats we found a rather interesting sample – Trojan.AndroidOS.Loapi.

This Trojan boasts a complicated modular architecture that means it can conduct a variety of malicious activities: mine cryptocurrencies, annoy users with constant ads, launch DDoS attacks from the affected device and much more.
Six years's porridge.

Dridex not a laundry soap btw; it's a Trojan An employee of Barclays Bank who laundered thousands of pounds on behalf of Moldovan cybercriminals was sentenced to six years and four months in prison yesterday.…

Still Stealing

Two years ago we published a blogpost about a popular malware that was being distributed from the Google Play Store.
In October and November 2017 we found 85 new malicious apps on Google Play that are stealing credentials for VK.com
During past few years, the number and quality of attacks aimed financial sector organizations has continuously grown.

The financial institutions that have not already thought about cyber security, will soon face the consequences of hacker attacks.
The end of the year is a good time to take stock of the main cyberthreat incidents that took place over the preceding 12 months or so.

To reflect on the impact these events had on organizations and individuals, and consider what they could mean for the overall evolution of the threat landscape.
Welcome to ransomware in 2017 – the year global enterprises and industrial systems were added to the ever-growing list of victims, and targeted attackers started taking a serious interest in the threat. It was also a year of consistently high attack numbers, but limited innovation.
This time of year is an ideal hunting ground for hackers, phishers and malware spreaders; disguising their attacks as offers too good to refuse, a concerned security message from your bank requiring urgent attention, a special rate discount from your credit card service, and more.