Android ransomware requires victim to speak unlock code

Latest Android.Lockdroid.E variant uses speech recognition instead of typing for unlock code input. Blog Feature Image:  EB-Header-image109.jpeg Publish to Facebook:  No Twitter Card Style:  summary Being a good listener is normally considered an admirable quality in a person; however, it isn’t a quality you necessarily want to find in a piece of malware. The latest…

Read More

Symantec and other industry leaders announce expanded Cyber Threat Alliance

Cybersecurity consortium formally establishes rapid security intelligence sharing system to combat cybercrime and advanced attacks. Blog Feature Image:  EB-Stats-02.jpeg Twitter Card Style:  summary Symantec is one of the six founding members of the Cyber Threat Alliance (CTA) which yesterday announced its formal incorporation as a not-for-profit entity. The organization also announced the appointment of former…

Read More

Sage 2.0 ransomware delivered by Pandex spambot, mimics Cerber routines

New variants of Sage ransomware sport Cerber-like behavior, although no definitive link was found between the two families. Twitter Card Style:  summary Symantec Security Response has recently discovered the Sage 2.0 ransomware (Ransom.Cry) being delivered by the Trojan.Pandex spambot, which we have previously seen sending JS downloaders with spambots, banki Click to Tweet:  Sage 2.0…

Read More

Attackers target dozens of global banks with new malware

Watering hole attacks attempt to infect more than 100 organizations in 31 different countries. Blog Feature Image:  virtual_abstraction.jpg Twitter Card Style:  summary Organizations in 31 countries have been targeted in a new wave of attacks which has been underway since at least October 2016. The attackers used compromised websites or “watering holes” to infect pre-selected…

Read More

Latest Intelligence for January 2017

The email malware rate drops due to Necurs botnet inactivity and two new Android malware families appeared. Blog Feature Image:  intelligence.jpg Twitter Card Style:  summary Some of the key takeaways from January’s Latest Intelligence, and the threat landscape in general, include a lull in activity from the Necurs botnet affecting the email malware rate, new…

Read More

Latest Intelligence for January 2017

The email malware rate drops due to Necurs botnet inactivity and the Angler exploit kit makes a surprise comeback. Twitter Card Style:  summary Some of the key takeaways from January’s Latest Intelligence, and the threat landscape in general, include a lull in activity from the Necurs botnet affecting the email malware rate, the return of…

Read More

Android ransomware repurposes old dropper techniques

Android ransomware is now using dropper techniques to drop malware on rooted devices as well as an inefficient 2D barcode ransom demand. Blog Feature Image:  phone-alert.jpg Twitter Card Style:  summary Android.Lockdroid.E has been seen using a dropper technique to drop a version of itself on rooted Android devices. While this is not an uncommon technique,…

Read More

Android ransomware repurposes old dropper techniques

Android ransomware is now using dropper techniques to drop malware on rooted devices as well as an inefficient 2D barcode ransom demand. Twitter Card Style:  summary Android.Lockdroid.E has been seen using a dropper technique to drop a version of itself on rooted Android devices. While this is not an uncommon technique, this is the first…

Read More

Android ad malware on Google Play combines three deception techniques

Three apps on Google Play use delayed attacks, self-naming tricks, and an attack list dictated by a command and control server to click on ads in the background without the user's knowledge. Blog Feature Image:  EB-generic-tablet.jpeg Twitter Card Style:  summary Contributor: Martin Zhang Summary: Three apps on Google Play use delayed attacks, self-naming tricks, and…

Read More

Android ad malware on Google Play combines three deception techniques

Three apps on Google Play use delayed attacks, self-naming tricks, and an attack list dictated by a command and control server to click on ads in the background without the user's knowledge. Twitter Card Style:  summary Contributor: Martin Zhang Summary: Three apps on Google Play use delayed attacks, self-naming tricks, and an attack list dictated…

Read More