Remove 2019 Remove Adware Remove Antivirus Remove Cryptocurrency
article thumbnail

Mobile malware evolution 2020

SecureList

The word “covid” in various combinations was typically used in the names of packages hiding spyware and banking Trojans, adware or Trojan droppers. If you look at the dynamics of attacks on mobile users in 2020, you will see that the average monthly number of attacks decreased by 865,000 compared to 2019.

Mobile 132
article thumbnail

IT threat evolution Q1 2021. Non-mobile statistics

SecureList

In South Korea, a suspect in the GandCrab ransomware operation was arrested (this family ceased active distribution back in 2019). For now, we can tentatively assume that the growth in cryptocurrency prices, in particular bitcoin, has attracted the attention of cybercriminals and returned miners to their toolkit. into the system.

Mobile 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Jump ahead: Adware. Adware, also known as malvertising , is a type of malware that downloads or displays advertisements to the user interface. Rather than stealing data, adware is more of an irritant forcing users to see unwanted ads. Most users are familiar with adware in the form of unclosable browser pop-ups.

Malware 105
article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

From mining cryptocurrency to launching DDoS attacks against networks, there are countless ways in which malware can access and utilize victim’s computers and data. Malware can be categorized based on how it behaves (adware, spyware and ransomware), and how it propagates from one victim to another (viruses, worms and trojans).

article thumbnail

The Most Common Types of Malware in 2021

CyberSecurity Insiders

From mining cryptocurrency to launching DDoS attacks against networks, there are countless ways in which malware can access and utilize victim’s computers and data. Malware can be categorized based on how it behaves (adware, spyware and ransomware), and how it propagates from one victim to another (viruses, worms and trojans).

Malware 107
article thumbnail

Overview of Google Play threats sold on the dark web

SecureList

The offers presented in this report were published between 2019 and 2023 and were collected from the nine most popular forums for the purchase and sale of goods and services related to malware and unwanted software. It is also clear of alerts from Google Protect and built-in antivirus on devices from different vendors.

Malware 99
article thumbnail

IT threat evolution Q3 2022

SecureList

All of them were ordinary people using our free antivirus solution, seemingly unconnected with any organization of interest to a sophisticated attacker of this kind. VileRAT is a Python implant, part of an evasive and highly intricate attack campaign against foreign exchange and cryptocurrency trading companies.

Malware 100