Android Malware With Almost 500M Downloads Resides in Google Play

Malicious SDK found on Google Play endangers millions of Android users

Millions of Android users may be at risk of a cyberattack because of Android malware, and multiple modifications on Google Play. In a recent blog post, Dr. Web reported that the trojan module, “Android.Spy.SpinOk,”. The module distributes via a marketing software development kit (SDK) on 101 Google Play applications, with over 421,290,300 downloads. How does… Continue reading Android Malware With Almost 500M Downloads Resides in Google Play

Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks

An investigation into a supply chain attack that hit 3CX last month found that the incident was caused by another supply chain compromise. First, the attackers targeted Trading Technologies, which automates stock trading, and distributed trojanized versions of its software. Let me remind you that the FBI warned about the increase of supply chains attacks,… Continue reading Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks

Mobile Malware Threat Landscape — 2022 Summary

As the use of smartphones proliferates, so does the likelihood of being exposed to a phone-based cyber attack.

Today, a smartphone is much more than just a way to reach someone on the phone. Our smartphones contain valuable information, such as private photos, logins, and passwords for online banking. No wonder scammers are trying every way to gain access to our gadgets. Unfortunately, malware developers have mastered mobile platforms and continue to annoy… Continue reading Mobile Malware Threat Landscape — 2022 Summary

Reverse Shell vs. Backdoor : What is the Differences?

Backdoor and Reverse Shell are very similar, which may lead you to believe they are the same thing. But take your time with conclusions on this point; we have given you the below guidance on the difference between the two mechanisms. What is Backdoor? Backdoors are methods of bypassing a computer’s security measures that aren’t… Continue reading Reverse Shell vs. Backdoor : What is the Differences?

Hackers Compromise Comm100 Live Chat to Attack a Supply Chain

The official installer of the Comm100 Live Chat SaaS application, which is widely used by companies to communicate with customers and website visitors, has been infected with a Trojan. The malicious version of the application was distributed through the vendor’s website from at least September 26 to September 29, 2022. As a result, organizations from… Continue reading Hackers Compromise Comm100 Live Chat to Attack a Supply Chain

Developer of CodeRAT Trojan Releases Source Code

The source code for the CodeRAT remote access trojan has been published on GitHub. This happened after the security researchers identified the malware developer and called him to account because of the attacks in which this “tool” was used. SafeBreach experts say that the attacks using CodeRAT were built as follows: the campaign was aimed… Continue reading Developer of CodeRAT Trojan Releases Source Code

TrickBot Hack Group Systematically Attacks Ukraine

IBM Security X-Force experts noticed that from the very beginning of the full-scale Russian invasion, the TrickBot hack group “systematically attacks” Ukraine, which has not been observed before. It is believed that from mid-April to June 2022, hackers have already organized at least six such phishing campaigns. Let me remind you that the TrickBot hack… Continue reading TrickBot Hack Group Systematically Attacks Ukraine

ZuoRAT Trojan Hacks Asus, Cisco, DrayTek and NETGEAR Routers

Lumen Black Lotus Labs has discovered a new Remote Access Trojan (RAT) called ZuoRAT, attacking remote workers’ routers in North America and Europe since 2020. The malware appeared in the first months of the COVID-19 pandemic but remained unnoticed for more than two years. The researchers write that the complexity of this targeted campaign, as… Continue reading ZuoRAT Trojan Hacks Asus, Cisco, DrayTek and NETGEAR Routers

Europol and Intelligence Agencies of 11 Countries Destroyed the FluBot Trojan Infrastructure

Europol announced that law enforcement officers, as a result of an international operation, destroyed one of the fastest-spreading malware – the FluBot Trojan. Let me remind you that we also talked about the fact that Law enforcement officers closed the hacker resource RaidForums, and also that the US authorities arrest Kaseya hacker and attacker associated… Continue reading Europol and Intelligence Agencies of 11 Countries Destroyed the FluBot Trojan Infrastructure