Malware figures for Android rise rapidly
G DATA security experts discovered a new malware strain every 7 seconds in the second quarter.Cyber criminals are attacking Android users with increasing force.
Malware figures for Android rise rapidly
G DATA security experts discovered a new malware strain every 7 seconds in the second quarter.Cyber criminals are attacking Android users with increasing force.
G DATA analysis discovers Dosfuscation in the wild
The code of a malware downloader was so cleverly hidden that our analysts initially assumed it was a corrupted file. However, an in-depth analysis shows that this is a novel method for disguising batch and power shell commands.
Where we go, we don't need files: Analysis of fileless malware "Rozena"
Fileless malware leverages exploits to run malicious commands or launch scripts directly from memory using legitimate system tools such as Windows Powershell. Code Red and SQL Slammer were pioneers of fileless malware which date back to the early 2000s. Currently, this type of malware is on the rise…
Fake Fortnite apps for Android in circulation
The video game “Fortnite” is currently very popular among young gamers. A version for the Android operating system has been announced for this summer by the developers. Cybercriminals are aiming to play on the impatience of fans and are distributing fake apps.These also include supposed instructions…
SocketPlayer – a backdoor wandering off the beaten path
A malware by the name of „SocketPlayer” has sparked the interest of several security researchers. One of our own analysts has taken a closer look at this specimen.
New malware every 10 seconds!
IT security and Android may not be mutually exclusive in 2018. Google has already laid the groundwork and wants to deliver important updates faster to users so as to waste no time closing security holes. The spectre of a mobile catastrophe is growing. Worldwide around 74 percent use a smartphone…
Panning for virtual gold - using other people's equipment
For quite some time, criminal actors have been using mobile devices for mining, without the knowledge or consent of the user.
Crypt888: being lazy doesn’t pay
Making lots of money quick is the objective of most ransomware. A current analysis from one of G DATA’s researchers also shows another potential motif for distributing ransomware.
Profit through vulnerabilities
There are many aspects of Meltdown and Spectre that have an unpleasant aftertaste. One of these is the sale of a multi-million dollar Intel stock package shortly before the vulnerabilities in Intel's processors became publicly known.
Pirated Wordpress Add-On makes Websites Distribute Malware
Wordpress is a popular tool for creating web pages. Numerous extensions make your own programming skills superfluous. However, one should be careful when choosing its extensions.