
Panning for virtual gold - using other people's equipment
For quite some time, criminal actors have been using mobile devices for mining, without the knowledge or consent of the user.
Panning for virtual gold - using other people's equipment
For quite some time, criminal actors have been using mobile devices for mining, without the knowledge or consent of the user.
Crypt888: being lazy doesn’t pay
Making lots of money quick is the objective of most ransomware. A current analysis from one of G DATA’s researchers also shows another potential motif for distributing ransomware.
Profit through vulnerabilities
There are many aspects of Meltdown and Spectre that have an unpleasant aftertaste. One of these is the sale of a multi-million dollar Intel stock package shortly before the vulnerabilities in Intel's processors became publicly known.
Pirated Wordpress Add-On makes Websites Distribute Malware
Wordpress is a popular tool for creating web pages. Numerous extensions make your own programming skills superfluous. However, one should be careful when choosing its extensions.
Some 343 new Android malware samples every hour in 2017
The threat situation has continued to be high in the past year, with over 3 million new Android malware samples discovered. 744,065 of these were discovered in the fourth quarter of 2017. This means that G DATA analysts are counting an average of 8,225 new malware samples for the Android operating…
Lessons Learned from the Most Popular Ransomware Attacks of 2017
In this article, we will look back on how ransomware evolved in 2017 and expose what made it more efficient and effective resulting to greater damage in terms of cost and impact on different industries.
"Meltdown" and "Spectre": researchers discover severe CPU bugs
International researchers have discovered two severe vulnerabilities in the design of many recent CPUs. The vulnerabilities exist in CPUs from most major vendors, including Intel and AMD, and have been lingering there for over a decade. Microsoft has released an update which is also compatible with…
G DATA now protects your Bitcoin wallet, too
Cryptocurrencies such as Bitcoin or Ethereum enjoy an increasing amount of popularity. More online shops make decide to accept Bitcoin (subsuming other crypto currencies as well) as a method of payment. Wherever there is a large demand and potential profit, criminals are usually not far away. They…
Adverts and browser extensions target users of illegal streaming
Redirecting web traffic has been a lucrative business model for quite a while. This is true for both legal applications as well as cases on the fringes of legality. One of our G DATA researchers has taken a look at a current example: an advertisement banner which specifically targets the users of…
Android: Risk level increases
The threat level for Android devices has increased again: G DATA security experts have counted 810.965 new malicious files in the third quarter of 2017. This constitutes a 17% increase in comparison to the previous quarter. Meanwhile, with a share of 73% in Q3, Android has become the most popular…