Remove 2018 Remove Adware Remove Encryption
article thumbnail

Lumma/Amadey: fake CAPTCHAs want to know if you’re human

SecureList

Our recent research into the adware landscape revealed that this malicious CAPTCHA is spreading through a variety of online resources that have nothing to do with games: adult sites, file-sharing services, betting platforms, anime resources, and web apps monetizing through traffic.

Adware 129
article thumbnail

Mobile malware evolution 2020

SecureList

The word “covid” in various combinations was typically used in the names of packages hiding spyware and banking Trojans, adware or Trojan droppers. Last year was notable for both malware and adware, the two very close in terms of capabilities. Number of adware attacks on mobile users in 2019 and 2020 ( download ).

Mobile 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Scranos – A Cross Platform, Rootkit-Enabled Spyware rapidly spreading

Security Affairs

Although the campaign has not reached the magnitude of the Zacinlo adware campaign, it is already infecting users worldwide.” According to the experts, the operation is in a consolidation stage, first samples date back to November 2018, with a massive spike in December and January. The data sent to the C2 is encrypted with AES.

Spyware 104
article thumbnail

IT threat evolution Q1 2021. Non-mobile statistics

SecureList

If the victim organization is slow to pay up, even though its files are encrypted and some of its confidential data has been stolen, the attackers additionally threaten to carry out a DDoS attack. In addition, we detected an interesting adware program written in the Rust language, and assigned it the verdict AdWare.OSX.Convuster.a. .

Mobile 111
article thumbnail

IT threat evolution in Q3 2023. Non-mobile statistics

SecureList

Most prolific groups This section looks at ransomware groups that engage in so-called “double extortion”, that is, stealing and encrypting confidential data. Adware programs and fake system accelerators remained the main threat to macOS users in Q3. TOP 20 threats for macOS Verdict %* 1 AdWare.OSX.Agent.ai 6 AdWare.OSX.Amc.e

Mobile 121
article thumbnail

IT threat evolution in Q2 2021. PC statistics

SecureList

Microsoft Office exploits most often tried to utilize the memory corruption vulnerability CVE-2018-0802. As in the previous quarter, a total of 15 of the Top 20 threats for macOS are adware programs. Distribution of exploits used by cybercriminals, by type of attacked application, Q2 2021 ( download ). Country*. % of attacked users**.

Adware 115
article thumbnail

IT threat evolution in Q1 2022. Non-mobile statistics

SecureList

An intelligence team later discovered that HermeticRansom only superficially encrypts files, and ones encrypted by the ransomware can be decrypted. RUransom malware was discovered in March, which was created to encrypt files on computers in Russia. IoT attacks. IoT threat statistics. Country or territory*. %**.

Mobile 137