article thumbnail

The mobile malware threat landscape in 2023

SecureList

million malware, adware, and riskware attacks. The most common threat to mobile devices was adware: 40.8% of all threats detected. We detected more than 1.3 The year’s trends Malware, adware, and riskware attacks on mobile devices dipped in February, only to rise steadily until the end of the year.

Mobile 101
article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OneNote: A Growing Threat for Malware Distribution

Security Boulevard

Attackers are increasingly using OneNote documents to distribute malware, due to the heightened security measures against macro-based attacks and the widespread adoption and popularity of the platform. Key Takeaways: Threat actors are increasingly using Microsoft OneNote documents to deliver malware via phishing emails.

Malware 78
article thumbnail

OneNote documents have emerged as a new malware infection vector

CyberSecurity Insiders

Intro In February 2022, Microsoft disabled VBA macros on documents due to their frequent use as a malware distribution method. This move prompted malware authors to seek out new ways to distribute their payloads, resulting in an increase in the use of other infection vectors, such as password-encrypted zip files and ISO files.

Malware 98
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Malware, short for “malicious software,” is any unwanted software on your computer that, more often than not, is designed to inflict damage. Since the early days of computing, a wide range of malware types with varying functions have emerged. Best Practices to Defend Against Malware. Jump ahead: Adware. RAM scraper.

Malware 104
article thumbnail

Dridex malware, the banking trojan

CyberSecurity Insiders

The malware is primarily used to steal sensitive information, such as login credentials and financial information, from victims. Dridex is known for its ability to evade detection by using dynamic configuration files and hiding its servers behind proxy layers.

Banking 78
article thumbnail

SoReL-20M Sophos & ReversingLabs release 10 million disarmed samples for malware study

Security Affairs

Sophos and ReversingLabs released SoReL-20M, a database containing 20 million Windows Portable Executable files, including 10M malware samples. Sophos and ReversingLabs announced the release of SoReL-20M , a database containing 20 million Windows Portable Executable files, including 10 million malware samples. ” continues Sophos.

Malware 113