article thumbnail

For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records

Krebs on Security

Less than a week ago, security researcher Nitish Shah directed KrebsOnSecurity to an open database on the Web that allowed anyone to query up-to-the-minute mSpy records for both customer transactions at mSpy’s site and for mobile phone data collected by mSpy’s software. The database required no authentication.

Spyware 182
article thumbnail

Ransomware en masse on the wane: top threats inside web-phishing in H1 2020

Security Affairs

Every third email, meanwhile, contained spyware , which is used by threat actors to steal payment data or other sensitive info to then put it on sale in the darknet or blackmail its owner. Ransomware operators have focused on targeted attacks,choosing large victims with a higher payment capacity. About Group-IB.

Phishing 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On the 20th Safer Internet Day, what was security like back in 2004?

Malwarebytes

Since 2004, there's been an annual event designed to "Promote safer and more responsible use of online technology and mobile phones, especially amongst children and young people across the world." The pop up blocker in particular was a big help with the proliferation of adware and spyware plugging into advertising networks.

article thumbnail

The State of Stalkerware in 2023–2024

SecureList

Stalkerware requires physical access to be installed, but our report also looks at a range of remote technology that can be used for nefarious purposes. Not only can the intruder violate their victim’s privacy by monitoring their activities, but they can also use the software to access huge volumes of personal data.

Mobile 78
article thumbnail

$12m Grindr fine shows GDPR’s got teeth

Malwarebytes

Additional Personal Data we receive about you, including: Third-Party Tracking Technologies. Data privacy, and privacy policies, are an “uncool” story for many. Yet much of the bad old days of Adware/spyware from 2005 – 2008 was dependent on bad policies and leaky data sharing.

article thumbnail

FinSpy: unseen findings

SecureList

Kaspersky has been tracking deployments of this spyware since 2011. Based on the data collected by the Post-Validator, it is most likely that: The Post-Validator is deployed to ensure that the infected victim is the intended one. FinSpy, also known as FinFisher or Wingbird , is an infamous surveillance toolset.

article thumbnail

APT trends report Q2 2023

SecureList

Following this, we released the first of a series of additional reports describing the final payload in the infection chain: a highly sophisticated spyware implant that we dubbed “TriangleDB” Operating in memory, this implant periodically communicates with the C2 (command and control) infrastructure to receive commands.

Malware 83