Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    November 2014
    S M T W T F S
    « Oct    
     1
    2345678
    9101112131415
    16171819202122
    23242526272829
    30  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Mobile’ Category




    Based on our research into the iOS threat Masque Attacks announced last week, Trend Micro researchers have found a new way that malicious apps installed through successful Masque Attacks can pose a threat to iOS devices: by accessing unencrypted data used by legitimate apps. According to reports, the iOS threat uses enterprise provisioning to attack non-jailbroken iOS devices as WireLurker does. This means that  provisioning allows enterprises to install “homegrown” apps on iOS devices without the need to be reviewed by Apple. They can ...

    Posted in Mobile |



    These days, when you see someone staring intently or tapping at their mobile phones, chances are that they’re busy with an app. This comes as no surprise as 80% of consumers’ time on mobile devices apps is spent in apps for gaming, news, productivity, utility, social networking, and more. Safe and Risky Apps We are currently seeing almost 11 million samples in existence as of October 2014. Of these samples, 64% are considered safe, while 23% are considered high risk or adware. The app permissions ...

    Posted in Mobile |



    Earlier this week, we noticed that there was a spike in the volume of spammed messages that pretend to come from the messaging service Viber.  This app, which also has  a desktop version, allows users for free calls and messages. The email informs the recipient that they have one voice message for their account. Figure 1. Sample spammed message Different Routines for PC and Mobile The infection routine is pretty straightforward for computers: clicking the embedded link leads to the download of backdoor malware, detected ...




    We first lifted the veil on activities in the Chinese cybercriminal underground in 2012. Since then, we have continually reported about notable changes or activity found in this black market. A few months ago, we noted that the Chinese underground has continued to grow, as the cost of connectivity and hardware continues to fall, and with more users with poor security precautions in place. In short, it’s a good time to be a cybercriminal in China. One of the more notable features ...

    Posted in Mobile |



    Recently, it has been reported that apps downloaded via third-party app stores in South Korea have resulted in more than 20,000 smartphones being infected with malicious apps. Note that none of these apps were found on the official Google Play store. The apps involved in this attack are detected as ANDROIDOS_KRBOT.HRX. We decided to look further into this slew of infections. Identifying Who's Responsible The cybercriminals behind these attacks are active members of underground forums involving pirated apps. Frequently, these are cracked versions of top gaming ...

    Posted in Malware, Mobile |


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice