In a blog post on Wednesday, Symantec security researchers wrote they had discovered at least eight Google Play Store apps that functioned as fronts for a "new and highly prevalent type of Android malware" called Android.Sockbot. The apps in question presented themselves as skins for player characters in popular app Minecraft: Pocket Edition and boasted "an install base ranging from 600,000 to 2.6 million devices."
Tagged With malware
When Google's Safe Browsing tool is working at its best, it's invisible -- a silent barrier between you and all the malware, phishing attempts and other goblins lurking on the web. But every once in a while, you'll see a glaring red warning when you try to visit a website that tells you to get the hell out of there.
An unknown hacker has gathered up to 711 million email accounts stored on an "open and accessible" server in the Netherlands, ZDNet reports. The server contains passwords to both email addresses and servers which are apparently being used to send large amounts of spam through legitimate accounts, thereby bypassing filters.
Google has removed roughly 300 apps from its Play Store after security researchers from several internet infrastructure companies discovered that the seemingly harmless apps -- offering video players and ringtones, among other features -- were secretly hijacking Android devices to provide traffic for large-scale distributed denial of service (DDoS) attacks.
Earlier this week, reports emerged that the head of the Ukrainian Cyber Police is seeking criminal charges against the Ukrainian tax software company that was the first victim of the crippling NotPetya malware attack. Now, it has come to light that the firm's servers have been seized by authorities.
Janus Cybercrime Solutions, the author of Petya -- the ransomware initially attributed with Wednesday's global cyberattacks -- resurfaced on Twitter early Thursday, seemingly offering to help those whose files can no longer be recovered.
The altruistic gesture, even if it does prove fruitless, is uncharacteristic of the criminal syndicate that launched an underworld enterprise by placing powerful exploits in the hands of others to deploy as they saw fit. It may also simply indicate that Janus would prefer not to be tagged with the spread of "NotPetya" -- so named by Kaspersky Lab, which has itself sought to differentiate between Janus' ransomware and that which worked havoc across Europe this week.
There's consensus now among malware experts that NotPetya is actually a wiper -- malware designed to inflict permanent damage -- not ransomware like Petya, which gave its victims' the option of recovering their data for a price.
The seemingly local cyberattack that cut power to part of Ukraine's capital, Kiev, last December could have been a test run. And security researchers now say the malware believed to have caused the blackout is actually modular, mostly automated and highly adaptable. That means it doesn't just work on electrical grids in Ukraine. This dangerous cyberweapon might work in Sydney or Paris or New York -- anywhere really.
Data backups can save your skin from all kinds of IT mishaps like dropping your laptop in a lake or having a virus blast through your hard drive. You should be backing everything up! Thanks to the recent spree of ransomware attacks, it's once again time to evaluate your backup system, so you're prepared in the event that some malicious actor locks up your computer.
A week after WannaCry induced worldwide panic, another vicious ransomware attack is currently underway.
French auto giant Renault became the first major French company to report being affected by Friday's ransomware attack that affected tens of thousands of computers in almost 100 countries across the world, reports Automotive News. An English plant of Renault's alliance partner Nissan was also hit by the attack.
The WannaCry ransomware attack that spread around the globe yesterday caused chaos at hospitals, manufacturing shutdowns, headaches for Microsoft and overtime for cybersecurity professionals. But the hackers responsible for this absurd attack have made relatively little in the way of profits.
An anonymous 22-year-old security researcher who goes by MalwareTech has, at least temporarily, managed to find a kill switch for the ransomware that spread across the globe yesterday. He insists his discovery was entirely accidental but experts credit his quick action for mostly stopping the malware from spreading to the United States.
It's been a rough week in Mac security. First, Checkpoint warned users of a Trojan spreading in Europe that was the first of its kind. And now, one of the most prominent video transcoding apps for Mac has a malware problem.
The hacker's name is Janit0r. You've probably never heard of him, but perhaps you've heard of his work. Janit0r is reportedly the one behind a particularly gnarly but undeniably fascinating form of malware called BrickerBot. BrickerBot, as the name implies, will brick internet of things (IoT) devices that fail a simple security test. This is surely illegal, but I love it.