Exploits

Drammer: Are hardware vulnerabilities the Achilles heel of Android?

Drammer: Are hardware vulnerabilities the Achilles heel of Android?

10/28/2016 - Mobile devices, especially smartphones, are a very lucrative target for cyber criminals because they are a fixture of everyday private and working life. Researchers at VUSec Labs, the University of California and Graz University of Technology have succeeded in exploiting a security hole in Android smartphone hardware. The experts have called the attack vector “Deterministic Rowhammer” (Drammer for...

Author: Christian Lueg

G DATA Exploit Protection effectively prevents attacks by infected Magento shops

G DATA Exploit Protection effectively prevents attacks by infected Magento shops

10/22/2015 - Thousands of online shops running an outdated version of the Magento eCommerce platform have been infected with malware since 18 October 2015, according to a report by security firm Sucuri (https://blog.sucuri.net/2015/10/massive-magento-guruincsite-infection.html). The infected shops distribute exploit kits to visitors in order to steal payment or login data. This is the third largest wave of...

Author: Siebert, Thomas , Christian Lueg

Staying alert when buying banners: Google's advertising service misused for distributing malware

Staying alert when buying banners: Google's advertising service misused for distributing malware

04/10/2015 - The recent case of malware distribution via Google AdSense advertising banners is an arresting example of how quickly a huge number of websites across the world can become embroiled in cyber attacks. A supplier of the advertising network has apparently been compromised. The attackers deployed the Nuclear exploit kit with the aim of infecting millions of users with malware. Since mid-March, Nuclear...

Author: Sabrina Berkenkopf , Matthias Meyer
G DATA | Trust in German Sicherheit