article thumbnail

Breach Exposes Users of Microleaves Proxy Service

Krebs on Security

Launched in 2013, Microleaves is a service that allows customers to route their Internet traffic through PCs in virtually any country or city around the globe. Microleaves works by changing each customer’s Internet Protocol (IP) address every five to ten minutes. io emerged as subsidiaries of Microleaves between 2017 and 2018.

article thumbnail

Mobile malware evolution 2020

SecureList

The word “covid” in various combinations was typically used in the names of packages hiding spyware and banking Trojans, adware or Trojan droppers. Last year was notable for both malware and adware, the two very close in terms of capabilities. Number of adware attacks on mobile users in 2019 and 2020 ( download ).

Mobile 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat in your browser: what dangers innocent-looking extensions hold for users

SecureList

For instance, when an account of the developer of a popular add-on was hijacked after a phishing attack, millions of users received adware on their devices without their knowledge. In that way, over 30,000 users got adware after an installed extension, dubbed Particle, was sold to new developers and later modified to inject ads into websites.

Adware 105
article thumbnail

Scranos – A Cross Platform, Rootkit-Enabled Spyware rapidly spreading

Security Affairs

Although the campaign has not reached the magnitude of the Zacinlo adware campaign, it is already infecting users worldwide.” According to the experts, the operation is in a consolidation stage, first samples date back to November 2018, with a massive spike in December and January.

Spyware 70
article thumbnail

IT threat evolution Q1 2021. Non-mobile statistics

SecureList

Exploits for CVE-2015-2523 — use-after-free vulnerabilities in Microsoft Excel — and CVE-2018-0802 , which we’ve often written about, were also in demand. Updated adware for the new Macs also immediately appeared, in particular the Pirrit family (whose members placed high in our Top 20 threats for macOS). into the system.

Mobile 91
article thumbnail

NEW TECH: ‘Network Traffic Analysis’ gets to ground truth about data moving inside the perimeter

The Last Watchdog

Modular microservices, software containers and orchestration tools get spun up, using open source components; all of this mixing and matching occurs in the internet cloud, keeping things moving right along. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be. (LW

article thumbnail

MY TAKE: Android users beware: Google says ‘potentially harmful apps’ on the rise

The Last Watchdog

Malware deliveries Upon reviewing Android usage data for all of 2018, Google identified a rise in the number of “potentially harmful apps” that were preinstalled or delivered through over-the-air updates. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.

Mobile 138