HackDig : Dig high-quality web security articles for hacker

IT threat evolution Q1 2017

Overview Targeted attacks and malware campaigns More wipers The aim of most targeted attack campaigns is to steal sensitive data. However, this isn’t always the goal. Sometimes attackers erase data instead of – or as well as – trying to gain access to confidential information. We’ve seen several wiper attacks in recent years. They include Shamoon
Publish At:2017-05-22 11:35 | Read:1667 | Comments:0 | Tags:Analysis Featured Quarterly Malware Reports APT Cyber espion

IT threat evolution Q1 2017. Statistics

Q1 figures According to KSN data, Kaspersky Lab solutions detected and repelled 479,528,279 malicious attacks from online resources located in 190 countries all over the world. 79,209,775 unique URLs were recognized as malicious by web antivirus components. Attempted infections by malware that aims to steal money via online access to bank accounts were regis
Publish At:2017-05-22 11:35 | Read:1102 | Comments:0 | Tags:Analysis Featured Quarterly Malware Reports Financial malwar

Ztorg: money for infecting your smartphone

This research started when we discovered an infected Pokémon GO guide in Google Play. It was there for several weeks and was downloaded more than 500,000 times. We detected the malware as Trojan.AndroidOS.Ztorg.ad. After some searching, I found some other similar infected apps that were being distributed from the Google Play Store. The first of them, called
Publish At:2017-05-15 13:40 | Read:1773 | Comments:0 | Tags:Analysis Featured Publications advertisement Google Android

NDAY-2017-0105: Elevation of Privilege Vulnerability in MSM Thermal Driver

By: Zuk Avraham Follow Zuk Avraham (@ihackbanme) Nicolas Trippar Follow Nicolas Trippar (@ntrippar) Following our announcement on N-Days Exploit Acquisition Program for smartphones, we are delighted to share the first couple of submissions. We received many submissions and we’re in the process of sharing them with ZHA followed by a public disclosure
Publish At:2017-04-25 15:35 | Read:1109 | Comments:0 | Tags:Android Mobile Malware Mobile security Threat Research Uncat

NDAY-2017-0102: Elevation of Privilege Vulnerability in NVIDIA Video Driver

By: Zuk Avraham Follow Zuk Avraham (@ihackbanme) Nicolas Trippar Follow Nicolas Trippar (@ntrippar) Following our announcement on N-Days Exploit Acquisition Program for smartphones, we are delighted to share the first couple of submissions. We received many submissions and we’re in the process of sharing them with ZHA followed by a public disclosur
Publish At:2017-04-25 15:35 | Read:1194 | Comments:0 | Tags:Android Mobile Malware Mobile security Mobile Threat Defense

Threat Research: FalseGuide

This Threat Research is about the recently (re)discovered “FalseGuide” threat found in Google Play. FalseGuide is form of malware that has been hidden in more than 40 game guide apps in Google Play since February 2017. According to reports, approximately 600,000 devices may have been infected before the known versions of the malware were removed from Google
Publish At:2017-04-25 15:35 | Read:867 | Comments:0 | Tags:Android Mobile Malware Mobile security Mobile Threat Defense

Mobile malware evolution 2016

The year in figures In 2016, Kaspersky Lab detected the following: 8,526,221 malicious installation packages 128,886 mobile banking Trojans 261,214 mobile ransomware Trojans Trends of the year Growth in the popularity of malicious programs using super-user rights, primarily advertising Trojans. Distribution of malware via Google Play and advertising servi
Publish At:2017-02-28 10:10 | Read:1568 | Comments:0 | Tags:Analysis Featured Kaspersky Security Bulletin Android Financ

ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar

ViperRAT is an active, advanced persistent threat (APT) that sophisticated threat actors are actively using to target and spy on the Israeli Defense Force. The threat actors behind the ViperRAT surveillanceware collect a significant amount of sensitive information off of the device, and seem most interested in exfiltrating images and audio content. The atta
Publish At:2017-02-17 03:30 | Read:1812 | Comments:0 | Tags:Alerts Enterprise Mobile Security Security APT IDF mobile ma

Expensive free apps

This post is the result of collaboration between 11paths (Telefonica’s Cybersecurity Global Unit) and Kaspersky Lab. Both companies have used their own expertise, researchers and tools, such as 11path’s Tacyt (Android apps monitoring) and GReAT’s internal tools and resources. Big Brother and Google Play Fraudulent apps trying to send Prem
Publish At:2017-01-23 07:30 | Read:2578 | Comments:0 | Tags:Blog Mobile Google Android Mobile Malware SMS Trojan

Do web injections exist for Android?

Web injection attacks There’s an entire class of attacks that targets browsers – so-called Man-in-the-Browser (MITB) attacks. These attacks can be implemented using various means, including malicious DLLs, rogue extensions, or more complicated malicious code injected into pages in the browser by spoofing proxy servers or other ways. The purpose of an M
Publish At:2017-01-18 12:10 | Read:1660 | Comments:0 | Tags:Blog Research Android Banking Trojan mobile browser Mobile M

Android Vulnerabilities: Attacking Nexus 6 and 6P Custom Boot Modes

Co-authored by Michael Goberman. In recent months, the X-Force Application Security Research Team has discovered several previously undisclosed Android vulnerabilities. The November 2016 and January 2017 Android Security Bulletins included patches to one high-severity vulnerability, CVE-2016-8467, in Nexus 6 and 6P. Our new paper, “Attacking Nexus 6 &a
Publish At:2017-01-05 22:25 | Read:2166 | Comments:0 | Tags:Advanced Threats Mobile Security Software & App Vulnerabilit

Switcher: Android joins the ‘attack-the-router’ club

Recently, in our never-ending quest to protect the world from malware, we found a misbehaving Android trojan. Although malware targeting the Android OS stopped being a novelty quite some time ago, this trojan is quite unique. Instead of attacking a user, it attacks the Wi-Fi network the user is connected to, or, to be precise, the wireless router that serves
Publish At:2016-12-28 11:20 | Read:1813 | Comments:0 | Tags:Blog Mobile DNS Google Android Mobile Malware Router

Mobile threats 2016: targeted attacks, major vulns, and innovative malware

This year was a prolific one for threat actors, who focused on writing sophisticated code and building on existing threat families, and used familiar distribution techniques. We’ve boiled down 2016 into five significant mobile threat-types that enterprises and individuals alike should know about. We look at a serious, targeted iOS threat; malware that roots
Publish At:2016-12-21 22:15 | Read:1432 | Comments:0 | Tags:Security android iOS mobile malware mobile threats vulnerabi

IT threat evolution Q3 2016

Statistics  Download the full report (PDF) Overview Targeted attacks and malware campaigns Dropping Elephant Targeted attack campaigns don’t need to be technically advanced in order to be successful. In July 2016 we reported on a group called Dropping Elephant (also known as ‘Chinastrats’ and ‘Patchwork’). Using a combinati
Publish At:2016-11-12 08:35 | Read:1667 | Comments:0 | Tags:Analysis Featured Quarterly Malware Reports APT Cyber espion

IT threat evolution Q3 2016. Statistics

Overview  Download the full report (PDF) Statistics All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works with various anti-malware protection components. The data was collected from KSN users who agreed to provide it. Millions of Kaspersky Lab product users from 213 count
Publish At:2016-11-12 08:35 | Read:2255 | Comments:0 | Tags:Analysis Featured Quarterly Malware Reports APT Cyber espion

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud