IT threat evolution in Q1 2016

2016 has only just got underway, but the first three months have already seen the same amount of cybersecurity events that just a few years ago would have seemed normal for a whole year. The main underlying trends remained the same, while there was significant growth in trends related to traditional cybercrime, especially mobile threats and global ransomware epidemics. Continue reading IT threat evolution in Q1 2016

First step in cross-platform Trojan bankers from Brazil done

We found a new wave of different campaigns spreading the initial “Banloader” components in Jar (Java archive). It’s able to run on Linux, OS X, Windows. It’s also able to run under certain circumstances even on mobile devices. Continue reading First step in cross-platform Trojan bankers from Brazil done

Mobile malware evolution 2015

As the functionality of mobile devices and mobile services grows, the appetite of cybercriminals who profit from mobile malware will grow too. Malware authors will continue to improve their creations, develop new technologies and look for new ways of spreading mobile malware. Their main aim is to make money. Continue reading Mobile malware evolution 2015

The evolution of Acecard

After analyzing all the known malware modifications in Acecard family, we established that they attack a large number of different applications. In particular, the targets include nine official social media apps. Two other apps are targeted by the Trojan for their credit card details. But most interestingly, the list includes nearly 50 financial apps and services. Continue reading The evolution of Acecard