News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Infected apps in Google Play Store 
Kaspersky_news

Actually, Google checks its apps in the Google Play Store with its own scan service Google Protect, which also automatically checks the apps for malware on every Android device. Kaspersky proves that this does not always work: 190 infected apps were distributed 4,8 million times. They spread the Harly Trojan, which can also quickly end up on a company cell phone. Kaspersky cybersecurity experts have identified a malicious campaign on the Google Play Store with a total of more than 4,8 million downloads of infected applications. In the past two years, cybercriminals have impersonated more than 190 legitimate applications there...

Read more

The Dangerous Nine: A Brief Portrait of Malware
The Dangerous Nine: A Brief Portrait of Malware Programs

The idea of ​​any malware aimed at companies would go beyond the scope. Here, Varonis Threat Labs presents 9 important malware variants that have particularly targeted information in companies in recent years - mostly remote access trojans (RAT), information stealers or banking trojans. In addition to a clear trend towards highly individualized ransomware, the Varonis Threat Labs have also noticed an increasing spread of so-called "commodity malware" in the last year. This term refers to malware that is available for purchase or free download on a large scale, that is not tailored to individual victims...

Read more

CronRat: Linux malware is hiding in the calendar
B2B Cyber ​​Security ShortNews

CronRat is a new Linux trojan that hides in the scheduled tasks. The execution date on February 31st is of course invalid, but many security programs still fail to detect it. Researchers at e-commerce security specialist Sansec have discovered a new Linux remote access Trojan (RAT) that has found an unusual way of hiding itself from most security applications on the affected servers. CronRAT, as the security researchers dubbed it, disguises itself as a planned task - with the execution date February 31. Because this date is of course invalid and does not exist, the malware succeeds in ...

Read more

Dangerous: Tor2Mine Cryptominer with new variants
SophosNews

Sophos describes new variants of the Tor2Mine Cryptominer with new variants that are characterized by improved bypass, persistence and dissemination capabilities. If he is found in the network, he is usually not traveling alone. The Sophos analysis "Two flavors of Tor2Mine miners dig deep into networks with PowerShell, VBScript" shows how the miner evades detection, spreads automatically in a target network and is increasingly difficult to remove from an infected system. Tor2Mine is a Monero miner that has been active for at least two years. Monero miner Tor2Mine spreads automatically In the investigation, Sophos describes ...

Read more

Modified version of WhatsApp discovered
Kaspersky_news

Kaspersky experts have discovered a malicious version of a popular WhatsApp Messenger mod, an unofficial modification of the app. The 'FMWhasapp' mod distributes the Triada mobile trojan, which can download other trojans, display advertisements, take out subscriptions and intercept SMS from the affected user. With around two billion users worldwide, WhatsApp is one of the most popular instant messengers, but not all users are satisfied with the available functions. Therefore, users are sometimes looking for more user-friendly and modified versions that offer more options than the official version - such as choosing dynamic templates...

Read more

Banking Trojans beckon with obscene images
Eset_News

ESET security warning: banking trojan lures users into the trap with obscene images. Ousaban malware steals login credentials. The banking Trojan Ousaban is currently active in Europe and Brazil. The malware is primarily focused on stealing login credentials for online banking as well as popular email services. ESET researchers have been following Ousaban since 2018 and have observed continuous development since then. The people behind Ousaban sometimes use obscene images to spread the malware. The experts from the European IT security manufacturer published their analysis on Welivesecurity. Phishing e-mail with MSI file "Ousaban is mainly spread via phishing e-mails, ...

Read more

Beware of fake Clubhouse App for Android
Eset_News

Beware of fake Clubhouse app for Android: Fake app contains Trojans that steal login data and bypass two-factor authentication. The hype surrounding the audio-based chat app Clubhouse, which is only available for iPhones and iPads, is immense. With a supposed application for Android, criminals are currently trying to lure users into the malicious code trap. The "BlackRock" Trojan is hidden behind the counterfeit. If the malware gets onto the device, it looks for 458 online services and then tries to steal the login data. The target list includes well-known finance and shopping apps, crypto exchanges, as well as social media and messaging platforms. These include…

Read more

7 million attacks on employees in the home office every day
Notebook home office attacks

According to the ESET Threat Report for the third quarter of 2020, there are around 7,1 million attacks on employees in the home office every day. Cyber ​​criminals specialize in their attacks on the home office. The remote desktop protocol (RDP) remains the main target in the third quarter. Around 7,1 million attacks take place on home workers in the DACH region every day. That's an increase of around 390 percent since March. Attacks with Android banking malware also increased rapidly in the third quarter. Criminals are also increasingly relying on crypto miners again. These are results from the ESET Threat Report for the third quarter of 2020, the ...

Read more

H1 / 2020: Over 2 million infected Android apps
Android danger contaminated apps

The new G DATA Mobile Malware Report shows that malicious Android apps are available every second. The cyber defense company identified more than two million infected Android apps in the first half of 2020. Cyber ​​criminals publish an Android app with malware every eight seconds. That is the result of a current study by G DATA CyberDefense. Compared to the first half of 2019, an increase of over ten percent. The focus was particularly on fake corona trackers and droppers. Criminal hackers also attacked smartphones during the Corona crisis and tried to install malware on the devices. Current figures from G DATA CyberDefense ...

Read more

IT security managers see dangers
Bitdefender Study 10 in 10

Many IT security managers do not see themselves well prepared for future attacks and believe their companies can be blackmailed. Bitdefender study “10 in 10” on IT security recommends: Address the skills gap with more diversity. Seven in ten (71%) top management IT security officers believe that cyber war activities endanger their organization. Half (49%) worry that a ransomware attack could wipe out their business, and six in ten (59%) believe their business might pay extortionists. To better arm themselves, three quarters (76%) recommend more diversity among IT security professionals. This is one of the most important results…

Read more