HackDig : Dig high-quality web security articles for hacker

Faketoken evolves and targets taxi booking apps to steal banking info

Kaspersky discovered a news strain of the mobile banking Trojan Faketoken that displays overlays on top of taxi booking apps to steal banking information. Security experts from Kaspersky have discovered a news strain of the infamous mobile banking trojan Faketoken that implements capabilities to detect and record an infected device’s calls and display
Publish At:2017-08-18 14:30 | Read:93 | Comments:0 | Tags:Breaking News Malware Mobile Android Banking Malware Faketok

GhostClicker Adware is a Phantomlike Android Click Fraud

By Echo Duan and Roland Sun We’ve uncovered a pervasive auto-clicking adware from as much as 340 apps from Google Play, one of which, named “Aladdin’s Adventure’s World”, was downloaded 5 million times. These adware-embedded applications include recreational games, device performance utilities like cleaners and boosters, and file managers, QR and barcode sc
Publish At:2017-08-16 13:40 | Read:158 | Comments:0 | Tags:Mobile Social adware android GhostClicker

Fake Snapchat in Google Play Store

Introduction   Zimperium discovered and reported a fake version of the popular Snapchat app in the official Google Play Store; At the time of our discovery, it was the second result when searching for “Snapchat”. The fake version of Snapchat app is using “Snap Inc .” as Company Name, with a  ” .” appended to original name. Fake
Publish At:2017-08-11 02:50 | Read:286 | Comments:0 | Tags:Android Mobile Malware Mobile security Mobile Threat Defense

ZPI: One approach to rule them all

Introduction In 1975, a book was published that changed the way we approach complex problems. Inspired on how nature works “Adaptation in Natural and Artificial Systems” set the bases of genetic algorithms. The release date of this blogpost is strongly linked to that book, it is a symbolic tribute to its author, John Henry Holland, who passed out
Publish At:2017-08-10 08:55 | Read:221 | Comments:0 | Tags:Android iOS Mobile security Mobile Threat Defense Windows Ze

O Me, O My! Android O and Its Impact on the Enterprise

As the summer winds down, the next big wave of mobile OS updates is upon us — a seasonal trend that brings about excitement and positive change for both consumers and security leaders. With Google Android O version 8.0 set for imminent release, we’ve lined up some new features to look out for in the context of the mobile enterprise to ensure that you
Publish At:2017-08-08 16:20 | Read:194 | Comments:0 | Tags:Mobile Security Android Android Apps Android Security Google

Vulnerability in F2FS File System Leads To Memory Corruption on Android, Linux

August’s Android Security Bulletin includes three file system vulnerabilities (CVE-2017-10663, CVE-2017-10662, and CVE-2017-0750) that were discovered by Trend Micro researchers. These vulnerabilities could cause memory corruption on the affected devices, leading to code execution in the kernel context. This would allow for more data to be accessed and contr
Publish At:2017-08-08 05:25 | Read:165 | Comments:0 | Tags:Mobile Open source Vulnerabilities android F2FS Linux Vulner

The Svpeng Trojan continues to evolve, the last variant includes keylogger capabilities

Security experts at Kaspersky discovered the dreaded Svpeng Trojan has been recently modified to implement keylogger features. Cyber criminals are becoming even more aggressive and are using new stealth techniques. Security experts at Kaspersky have discovered that one of the most dangerous Android banking Trojan, Svpeng, has been recently modified to imple
Publish At:2017-08-02 13:35 | Read:248 | Comments:0 | Tags:Breaking News Cyber Crime Malware Mobile Android Cybercrime

Experts spotted Triada Trojan in firmware of low-cost Android smartphones

Malware researchers at the Russian anti-virus firm Dr.Web have spotted the Triada Trojan in the firmware of several low-cost Android smartphones. Another case of pre-installed malware make the headlines, malware researchers at the Russian anti-virus firm Dr.Web have spotted the Triada Trojan in the firmware of several low-cost Android smartphones, including
Publish At:2017-07-29 17:25 | Read:223 | Comments:0 | Tags:Breaking News Malware Mobile Android malware mobile pre-inst

Google experts blocked a new targeted malware family, the Lipizzan spyware

Google has identified a new strain of Android malware, the Lipizzan spyware, that could be used as a powerful surveillance tool. Malware researchers at Google have spotted a new strain of Android spyware dubbed Lipizzan that could exfiltrate any kind of data from mobile devices and use them as surveillance tools. The Lipizzan spyware is a project developed
Publish At:2017-07-28 04:35 | Read:253 | Comments:0 | Tags:Breaking News Malware Mobile Android Google Lipizzan spyware

After Big Takedown Efforts, 20 More BankBot Mobile Malware Apps Make It Into Google Play

A flashlight app, fake videos or a fake gaming app? Any one of those could be malicious and harboring a mobile malware app, right there in a trusted official app store. In an ongoing trend, IBM X-Force noted that malicious apps manage to circumvent controls and infiltrate legitimate stores. And this is not about the plethora of adware apps infecting users in
Publish At:2017-07-28 03:30 | Read:207 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Malware Mobile

SLocker source code leaked online for free, a gift for crooks and hackers

The SLocker source code leaked online, it is one of the oldest mobile lock screen and file-encrypting ransomware. The source code of the SLocker Android malware, one of the most popular Android ransomware families, has been leaked online for free, allowing crooks to develop their own variant of the threat. SLocker was first spotted in 2015, it is the first
Publish At:2017-07-24 18:31 | Read:247 | Comments:0 | Tags:Breaking News Cyber Crime Malware Android Android malware Cy

IntelliAV: Toward the Feasibility of Building Intelligent Anti-Malware on Android Devices

IntelliAV is a practical intelligent anti-malware solution for Android devices based on the open-source and multi-platform TensorFlow library. Android is targeted the most by malware coders as the number of Android users is increasing. Although there are many Android anti-malware solutions available in the market, almost all of them are based on malware sign
Publish At:2017-07-19 09:10 | Read:201 | Comments:0 | Tags:Breaking News Malware Mobile Android antivirus IntelliAV mal

Android Backdoor GhostCtrl can spy on victims and take over Windows Systems

The GhostCtrl backdoor, is an OmniRAT-Based Android malware that can spy on victims, steal data and take over Windows System using the RETADUP infostealer. Today’s smartphones are as powerful as the computers of only a few years ago. Unfortunately, that also means that Android phones have as many instances of malware as desktop and laptop computers. In
Publish At:2017-07-18 14:45 | Read:216 | Comments:0 | Tags:Breaking News Malware Mobile Android Cybercrime GhostCtrl Gh

Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More

by Lenart Bermejo, Jordan Pan, and Cedric Pernet The information-stealing RETADUP worm that affected Israeli hospitals is actually just part of an attack that turned out to be bigger than we first thought—at least in terms of impact. It was accompanied by an even more dangerous threat: an Android malware that can take over the device. Detected by Trend Micro
Publish At:2017-07-17 08:20 | Read:188 | Comments:0 | Tags:Mobile android backdoor GhostCtrl OmniRAT

Zero Packet Inspection

Introduction In this blogpost I describe the history of z9, our detection engine. I will show its performance over reference data sets commonly used in the machine learning community. I’ll then describe how we apply it to detect networks attacks without any type of packet inspection. Eventually, we encourage you to participate by helping us gather and
Publish At:2017-07-11 22:35 | Read:302 | Comments:0 | Tags:0-Packet Android iOS Machine Learning Mobile Malware Mobile

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud