Home Tags Hide

Tag: Hide

At the beginning of October 2017, we discovered new Android spyware with several features previously unseen in the wild.
In the course of further research, we found a number of related samples that point to a long-term development process. We believe the initial versions of this malware were created at least three years ago.
Google removes 60 apps packing the "AdultSwine" malware.
Plus: New Mario Tennis, free online hide-and-seek for Mario Odyssey
But a Mr. Robot-themed plug-in angered Mozilla users unfamiliar with the show.
Heartbreakingly short, but yoursquo;ll still get a payoff by playing it again.

And again.
A hacker from Florida was allegedly paid $100,000 to keep his mouth shut and delete stolen user data.
On 140 occasions, electrician logged that he was working while concealing his location.
According to KSN data, Kaspersky Lab solutions detected and repelled 277,646,376 malicious attacks from online resources located in 185 countries all over the world.
The authors of malware use various techniques to circumvent defensive mechanisms and conceal harmful activity. One of them is the practice of hiding malicious code in the context of a trusted process.

Typically, malware that uses concealment techniques injects its code into a system process, e.g. explorer.exe.

But some samples employ other interesting methods. We're going to discuss one such type of malware.

Spam and phishing in Q3 2017

In terms of the average share of spam in global email traffic (58.02%), the third quarter of 2017 was almost identical to the previous reporting period: once again growth was slightly more than one percentage point – 1.05 (and 1.07 p.p. in Q2 2017).

As in previous quarters, spammers were quick to react to high-profile events and adapted their fraudulent emails to the news agenda.