Remove 2011 Remove Cryptocurrency Remove Social Engineering Remove Spyware
article thumbnail

Don't plug your phone into a free charging station, warns FBI

Malwarebytes

The term was first used by Brian Krebs in 2011 after a proof of concept was conducted at DEF CON by Wall of Sheep. Instead, hackers know that our mobile devices store a lot of PII, which can be sold on the dark web for profit or re-used in social engineering campaigns. However, the chances of that happening are rather slim.

Mobile 98
article thumbnail

Mobile malware evolution 2020

SecureList

In their campaigns to infect mobile devices, cybercriminals always resort to social engineering tools, the most common of these passing a malicious application off as another, popular and desirable one. It stole credentials for various financial systems including online banking applications and cryptocurrency wallets in Brazil.

Mobile 132
article thumbnail

Updates from the MaaS: new threats delivered through NullMixer

Security Affairs

Such was related to a worldwide malware operation known as NullMixer, a controversial and widespread malware delivery maneuver based on SEO poisoning and social engineering technique to lure tech-savvy users, including IT personnel. The module also exfiltrates 2FA secrets from Twilio’s Authy local storage.

Malware 81