“GodFather” Hits Banks, Crypto Wallets Apps as Android Trojan Emerges

By Deeba Ahmed
Researchers believe that GodFather could be a successor of another banking trojan called Anubis, which had its source code leaked in January 2019 on an underground hacking forum.
This is a post from HackRead.com Read the original post: “… Continue reading “GodFather” Hits Banks, Crypto Wallets Apps as Android Trojan Emerges

Anubis malware resurfaces targeting crypto wallets and banking apps

By Waqas
So far, 394 malicious apps have been identified that are spreading Anubis malware to steal financial and personal data from Android users.
This is a post from HackRead.com Read the original post: Anubis malware resurfaces targeting crypto wall… Continue reading Anubis malware resurfaces targeting crypto wallets and banking apps

A Department of Defense bulletin on a ‘leaking’ sinkhole has baffled cybersecurity experts

In mid-April, an obscure agency housed under the Department of Defense issued a bulletin that a little-known, Chinese-linked hacking group is likely responsible for some suspicious activity aimed at defense contractors in the U.S. But how the Defense Counterintelligence and Security Agency (DCSA) came to that conclusion is complicated. The alert, sent to 38 contractors, says DCSA detected the group was making “inbound and outbound connections” with contractors’ facilities as of Feb. 1. The targeting, which appeared to have stopped by March 25, was directed at several critical infrastructure sectors, including aerospace, health care and maritime, according to a copy of the bulletin obtained by CyberScoop. A DCSA official tells CyberScoop the document was meant to raise awareness among the contractors, but numerous sources tell CyberScoop that it is more confusing than clarifying. The bulletin, which was first reported by Politico, has raised questions about the attributed hacking group and if the actions described […]

The post A Department of Defense bulletin on a ‘leaking’ sinkhole has baffled cybersecurity experts appeared first on CyberScoop.

Continue reading A Department of Defense bulletin on a ‘leaking’ sinkhole has baffled cybersecurity experts

Ginp Android trojan targets banking apps & threatens 2FA/SMS

By Waqas
Dubbed Ginp; the trojan keeps coming back with new capabilities. Here’s what the malware does to Android devices…
This is a post from HackRead.com Read the original post: Ginp Android trojan targets banking apps & threatens 2FA/SMS
Continue reading Ginp Android trojan targets banking apps & threatens 2FA/SMS

Sneaky motion-detection feature found on Android malware

A strain of malicious software was activated on Android smartphones only when the infected phone was moved, according to research published by security vendor Trend Micro. The malware came embedded in seemingly legitimate apps Currency Converter and BatterySaverMobi, which were available in the Google Play Store, Trend Micro said Thursday. Once downloaded, the malware sought to avoid detection by monitoring the motion sensor on victims’ devices. The logic seems to be that if a hacked phone was moving, the device probably wasn’t a research tool being used by a security company trying to detect malware, researchers said. “As a user moves, their device usually generates some amount of motion sensor data,” the company explained in a blog post. “The malware developer is assuming that the sandbox for scanning malware is an emulator with no motion sensors, and as such will not create that type of data. … If it senses that […]

The post Sneaky motion-detection feature found on Android malware appeared first on CyberScoop.

Continue reading Sneaky motion-detection feature found on Android malware