Remove 2017 Remove Malware Remove Social Engineering Remove Spyware
article thumbnail

APT C-23 group targets Middle East with an enhanced Android spyware variant

Security Affairs

A threat actor, tracked as APT C-23, is using new powerful Android spyware in attacks aimed at targets in the Middle East. The APT C-23 cyberespionage group (also known as GnatSpy, FrozenCell, or VAMP) continues to target entities in the Middle East with enhanced Android spyware masqueraded as seemingly harmless app updates (i.e.

Spyware 93
article thumbnail

New Coronavirus-themed malspam campaign delivers FormBook Malware

Security Affairs

Experts uncovered a new Coronavirus (COVID-19 ) -themed campaign that is distributing a malware downloader that delivers the FormBook information-stealing Trojan. Experts at MalwareHunterTeam uncovered a new malspam campaign exploiting the fear in the Coronavirus (COVID-19) to deliver malware. states the analysis published by FireEye.

Malware 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mobile malware evolution 2020

SecureList

In their campaigns to infect mobile devices, cybercriminals always resort to social engineering tools, the most common of these passing a malicious application off as another, popular and desirable one. The mobile malware Trojan-Ransom.AndroidOS.Agent.aq They typically work with malware developers to achieve this.

Mobile 138
article thumbnail

Operation Falcon: Group-IB helps INTERPOL identify Nigerian BEC ring members

Security Affairs

Since at least 2017, the prolific gang compromised at least 500,000 government and private sector companies in more than 150 countries. Business Email Compromise (BEC) is a type of email phishing attack that relies on social engineering. The investigation continues as some of the gang members remain at large.

article thumbnail

APT trends report Q3 2022

SecureList

Since the malware in this incident was compiled on April 15, 2021, and compilation dates are the same for all known samples, this incident is likely to be the first involving Maui ransomware. This report included technical details of malware used in the campaign, such as Ecipekac, SodaMaster, P8RAT, FYAnti and QuasarRAT.

Malware 142
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Malware, short for “malicious software,” is any unwanted software on your computer that, more often than not, is designed to inflict damage. Since the early days of computing, a wide range of malware types with varying functions have emerged. Best Practices to Defend Against Malware. Jump ahead: Adware. RAM scraper.

Malware 104
article thumbnail

Advanced threat predictions for 2022

SecureList

The Israeli Defense Forces (IDF) have claimed that threat actors have been using catfishing to lure Israeli soldiers into installing spyware. On September 24, the EU issued a statement regarding a disinformation campaign called “Ghostwriter”, ongoing since March 2017, intended to discredit NATO.

Mobile 135