article thumbnail

Mobile malware evolution 2020

SecureList

In 2020, Kaspersky mobile products and technologies detected: 5,683,694 malicious installation packages, 156,710 new mobile banking Trojans, 20,708 new mobile ransomware Trojans. Pandemic theme in mobile threats. The mobile malware Trojan-Ransom.AndroidOS.Agent.aq The year in figures. Trends of the year.

Mobile 132
article thumbnail

Counterfeit versions of popular mobile devices target WhatsApp and WhatsApp Business

Security Affairs

It allows a remote or local client to connect and operate in the “mysh” console application, which must first be installed on the device or initially present in its firmware. To avoid the risk of becoming a victim of such malware attacks, experts recommend to purchase mobile devices only from official stores and legitimate distributors.

Mobile 92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BlackMamba PoC Malware Uses AI to Avoid Detection

eSecurity Planet

While the HYAS researchers may have been wearing white hats, Mandiant researchers this week reported on a “suspected Chinese campaign that involves maintaining long term persistence by running malware on an unpatched SonicWall Secure Mobile Access (SMA) appliance.

Malware 94
article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

Avoid charging mobile devices through a computer; instead, use separate adapters. Use the administrator account only for maintenance, software installation, or firmware updates. Attention should be paid to protecting routers and updating their firmware. Use the 3-2-1 backup rule. Opt for strong, hard-to-crack passwords.

article thumbnail

Lemon Group gang pre-infected 9 million Android devices for fraudulent activities

Security Affairs

Infected devices were used for multiple malicious activities, including traffic redirections through mobile proxies, info-stealing, click fraud, and social media and online messaging accounts and monetization via advertisements. Threat actors compromised third-party software or the installation of malware-laced firmware.

Mobile 86
article thumbnail

NCSC warns of a surge in ransomware attacks on education institutions

Security Affairs

Below the list of recommendations provided by the agency that includes the use of updated antivirus software and anti-phishing defense measures: centrally manage devices in order to only permit applications trusted by the enterprise to run on devices, using technologies including AppLocker , or from trusted app stores (or other trusted locations) (..)

Education 145
article thumbnail

The State of Endpoint Security Management in 2022: It’s Worse Than You Suspect

CyberSecurity Insiders

These can be mobile phones, workstations, desktop and laptop computers, tablet computers, smartphones, IoT devices, wearable smart devices, as well as virtual environments, among many others. Around 49 percent of the poll’s respondents say that endpoint security is nonexistent for them, while 11 percent regard it as a lowest-priority matter.

IoT 120