Official Government COVID-19 Mobile Apps Hide a Raft of Threats
Android apps launched for citizens in Iran, Colombia and Italy offer cyberattackers new attack vectors. Continue reading Official Government COVID-19 Mobile Apps Hide a Raft of Threats
Collaborate Disseminate
Android apps launched for citizens in Iran, Colombia and Italy offer cyberattackers new attack vectors. Continue reading Official Government COVID-19 Mobile Apps Hide a Raft of Threats
Coronavirus-themed scams show no signs of letting up as hackers try to breach mobile phone users in Italy and Spain, the two countries with the most deaths from the virus. Attackers laced mobile apps with malware to try to steal data from Italian and Spanish residents looking for updates on the pandemic, according to Slovakian antivirus firm ESET. The phony apps pose as legitimate ones offering updates on the spread of the novel coronavirus and how to assess your risk of infection. “Because of the current situation, many [hacking] campaigns are either migrating to a COVID-19 theme or new campaigns are created with a COVID-19 theme,” said Lukas Stefanko, an Android security specialist at ESET. The apps were available for download for a couple days. It is unclear how many people downloaded them. It is a reminder of the cruel opportunism with which many cybercriminals approach the crisis. When people turn to their phones for information on the deadly virus, hackers see […]
The post Hackers target mobile users in Italy in Spain, taking advantage of coronavirus hot spots appeared first on CyberScoop.
As COVID-19 spreads around the globe and key elements of society grind to a halt, satellite data is revealing its impacts on air quality and emissions of harmful pollutants. As it did in China, a lockdown in response to the coronavirus in Italy has led… Continue reading Coronavirus lockdown leads to decline in air pollution over Italy
As coronavirus infections surge globally, hackers and nation-state actors are weaponizing information about the COVID-19 virus to spread malware and disinformation, according to security researchers and the State Department. Russian actors, linked with Moscow through “state proxy websites,” for instance, have been using “swarms of online, false personas” to spread misinformation about the new coronavirus online, according to the Global Engagement Center, the State Department section meant to combat information operations around the world. Some of the fake narratives have allegedly been propagated by official state media, Lea Gabrielle, the center’s special envoy and coordinator, told lawmakers Thursday. Threat actors have also begun sending messages laced with malicious software to targets in Italy, where coronavirus infections have surged in recent weeks, according to new research unveiled this week from security firm Sophos. The attackers have been sending messages with a Microsoft Word document that appears to contain recommendations for preventing […]
The post Hackers seize on coronavirus fears for fodder in spearphishing, misinformation schemes appeared first on CyberScoop.
UniCredit was also hit with hacking incidents in September-October 2016 and June-July 2017. Continue reading UniCredit Suffers Third Breach Despite Investing Billions in Cybersecurity
In October 2019, we encountered a phishing campaign delivering a malicious Microsoft Word document that distributed ransomware with a twist. Unlike most ransomware families, such as GandCrab, WannaCry and RobinHood, the malware was not compiled code. I… Continue reading Ransomware Goes Fileless, Uses Malicious Documents and PowerShell to Encrypt Files
The head of Memento Labs, the new company that acquired infamous spyware vendor Hacking Team, admitted there’s a lot to do to recover after the 2015 breach and the damage to its reputation. But he believes it can compete against market leaders NSO Group. Continue reading Hacking Team’s New Owner: ‘We’re Starting From Scratch’
By Uzair Amir
The latest findings of security researchers at security firm Lookout and privacy firm Security Without Borders are not only groundbreaking but concerning. Reportedly, there is now an iOS version of a dangerous strain of Android malware, w… Continue reading Nasty Android & iOS malware found using govt surveillance tech
Italian government authorities have launched an inquiry into eSurv, a company that made spyware apps that it concealed as legitimate and innocuous-looking apps on the Google Play Store. Continue reading Prosecutors Launch Investigation Into Company That Put Malware on Google Play Store
A few days ago, I was investigating a sample piece of malware where our static analysis flagged a spreadsheet as containing a Trojan but the behavioural trace showed very little happening. This is quite common for various reasons, but one of … Continue reading Super Mario Oddity