article thumbnail

JOKERSPY used to target a cryptocurrency exchange in Japan

Security Affairs

An unnamed Japanese cryptocurrency exchange was the victim of a cyber attack aimed at deploying an Apple macOS backdoor named JokerSpy. Elastic Security Labs researchers provided details about a recently discovered intrusion at an unnamed cryptocurrency exchange, aimed at deploying an Apple macOS backdoor named JokerSpy.

article thumbnail

Experts found Joker Spyware in 24 apps in the Google Play store

Security Affairs

Security experts at Google have removed from Google Play 24 apps because they were infected with a new spyware tracked as “the Joker.” ” Google has removed from Google Play 24 apps because they were infected with a new spyware tracked as “the Joker.” ” states the analysis. The C&C URL 6.

Spyware 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A new sophisticated version of the AZORult Spyware appeared in the wild

Security Affairs

A new sophisticated version of the AZORult Spyware was spotted in the wild, it was involved in a large email campaign on July 18. Malware researchers at Proofpoint spotted a new version of the AZORult Spyware in the wild, it was involved in a large email campaign on July 18, just 24 hours it appeared in cybercrime forums on the Dark Web.

Spyware 45
article thumbnail

Threat landscape for industrial automation systems, H2 2021

SecureList

. >Percentage of ICS computers on which malicious objects were blocked ( download ). Percentage of ICS computers on which malicious objects were blocked, January – December 2018 – 2021 ( download ). Percentage of ICS computers on which malicious objects were blocked in selected industries ( download ). Malicious objects.

Spyware 90
article thumbnail

Threat landscape for industrial automation systems in H1 2021

SecureList

Percentage of ICS computers on which malicious objects were blocked ( download ). Top 15 countries and territories with the largest percentages of ICS computers on which malicious objects were blocked in H1 2021 ( download ). Percentage of ICS computers on which malicious objects were blocked, by region ( download ).

Spyware 93
article thumbnail

Security Affairs newsletter Round 422 by Pierluigi Paganini – International edition

Security Affairs

Xplain hack impacted the Swiss cantonal police and Fedpol Zyxel published guidance for protecting devices from ongoing attacks Kimsuky APT poses as journalists and broadcast writers in its attacks New Linux Ransomware BlackSuit is similar to Royal ransomware CISA adds Progress MOVEit Transfer zero-day to its Known Exploited Vulnerabilities catalog (..)

Spyware 82
article thumbnail

NullMixer: oodles of Trojans in a single dropper

SecureList

These websites are often related to crack, keygen and activators for downloading software illegally, and while they may pretend to be legitimate software, they actually contain a malware dropper. The whole infection chain of NullMixer is as follows: The user visits a website to download cracked software, keygens or activators.

Malware 114