Remove 2018 Remove Accountability Remove Adware Remove Encryption
article thumbnail

Mobile malware evolution 2020

SecureList

The word “covid” in various combinations was typically used in the names of packages hiding spyware and banking Trojans, adware or Trojan droppers. Last year was notable for both malware and adware, the two very close in terms of capabilities. Number of adware attacks on mobile users in 2019 and 2020 ( download ).

Mobile 134
article thumbnail

Scranos – A Cross Platform, Rootkit-Enabled Spyware rapidly spreading

Security Affairs

Although the campaign has not reached the magnitude of the Zacinlo adware campaign, it is already infecting users worldwide.” According to the experts, the operation is in a consolidation stage, first samples date back to November 2018, with a massive spike in December and January. The data sent to the C2 is encrypted with AES.

Spyware 68
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT threat evolution Q1 2021. Non-mobile statistics

SecureList

Attempts to run malware designed to steal money via online access to bank accounts were stopped on the computers of 118,099 users. At the end of last year, the number of users attacked by malware designed to steal money from bank accounts gradually decreased, a trend that continued in Q1 2021. Financial threats. into the system.

Mobile 87
article thumbnail

Cyberthreats to financial organizations in 2022

SecureList

This ransomware is controlled by command line parameters and can either retrieve an encryption key from the C2 or an argument at launch time. An incident investigation conducted by Kaspersky ICS CERT at one of the attacked enterprises revealed that they exploited a vulnerability in FortiGate VPN servers (CVE-2018-13379).

article thumbnail

IT threat evolution in Q2 2021. PC statistics

SecureList

Attempts to run malware for stealing money from online bank accounts were stopped on the computers of 119,252 unique users. Microsoft Office exploits most often tried to utilize the memory corruption vulnerability CVE-2018-0802. As in the previous quarter, a total of 15 of the Top 20 threats for macOS are adware programs.

Adware 93
article thumbnail

IT threat evolution Q2 2021

SecureList

Communication with the server can take place either over raw TCP sockets encrypted with RC4, or via HTTPS. com – all generated using RoyalRoad and attempting to exploit CVE-2018-0802. The ransomware supports two encryption modes: one generated dynamically and one using a hardcoded key. We Are Back ?

article thumbnail

IT threat evolution in Q1 2022. Non-mobile statistics

SecureList

Attempts to run malware for stealing money from online bank accounts were stopped on the computers of 107,848 unique users. In Q1 2022 Kaspersky solutions blocked the launch of at least one piece of malware designed to steal money from bank accounts on the computers of 107,848 unique users. Financial threats.

Mobile 98