Remove .well-known apple-app-site-association
article thumbnail

IT threat evolution Q3 2023

SecureList

To exfiltrate data and deliver next-stage malware, the attackers abuse cloud-based data storage, such as Dropbox or Yandex Disk, as well as a temporary file sharing service. The app descriptions were written in the respective languages and contained images very similar to those on the official Telegram page on Google Play.

Malware 98
article thumbnail

Gaming-related cyberthreats in 2020 and 2021

SecureList

In this report, we cover PC and mobile threats as well as various phishing schemes that capitalize on popular games. To measure the level of the cybersecurity risk associated with gaming, we investigated several types of threats. Methodology. We examined malware and unwanted software disguised as popular PC and mobile games.

Adware 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Financial cyberthreats in 2022

SecureList

In 2022, we saw a major upgrade of the notorious Emotet botnet as well as the launch of massive campaigns by Emotet operators throughout the year. We also witnessed the emergence of new banking Trojans that hunt for banking credentials, and greater activity on the part of some well-known ones, such as Dtrack, Zbot and Qbot.

Banking 76
article thumbnail

Cyber Threats to the FIFA World Cup Qatar 2022

Digital Shadows

For instance, financially-motivated threat actors often plant in malicious URLs spoofing these events to fraudulent sites, hoping to maximize their chances of scamming naive internet users for a quick (illicit) profit. At the same time, mobile apps constitute an expansion of the attack surface for every organization. com, for example).

article thumbnail

Mobile malware evolution 2020

SecureList

These apps were placed on malicious websites, hyperlinks were distributed through spam, etc. For example, the GINP banking Trojan pretended to be an app that searched for COVID-19-infected individuals: the victim was coaxed into providing their bank card details under the pretext of a €0.75 Apple’s iOS naturally comes second.

Mobile 138
article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

Vamosi: Hey, if you're like me you probably have a few 100 apps on your mobile device. So how can you have all those powerful apps on your mobile with less overall memory? How many apps today are vulnerable to leaking API information, how might future API based data breaches work. Okay, that's starting to get very personal.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

Vamosi: Hey, if you're like me you probably have a few 100 apps on your mobile device. So how can you have all those powerful apps on your mobile with less overall memory? How many apps today are vulnerable to leaking API information, how might future API based data breaches work. Okay, that's starting to get very personal.

Hacking 52