Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
Researchers have discovered a new batch of malicious apps on Google Play, some of which have been downloaded and installed on some 2.6 million devices. The malware, dubbed Sockbot, was found hiding in eight apps on Google Play, all offered by a single developer account.
Threats leveraging malicious macros are constantly changing to evade security measures that detect and block them. Recently, in spam email distributing URSNIF, a malware famous for adopting new tools, Trend Micro saw simple checks that the malware uses to evade sandbox detections.
The Necurs botnet has recently undergone a resurgence, distributing millions of malicious emails. The ransomware is also attaching a downloader with the functionality to gather telemetery from infected victims – taking screengrabs of infected machines and sending them back to a remote server.
A new ransomware is being distributed by the Magnitude exploit kit, which Trend Micro found targeting South Korea via malvertisements on attacker-owned domains and sites. The development in Magnitude’s activity is notable because it eschewed Cerber –its usual ransomware payload– in favor of Magniber.
A discovery from Forensiq, which focuses on the detection and prevention of ad fraud, claims advertisers are losing big money from a stealthy bot that’s using a new tactic to siphon millions of dollars away from sports websites including NFL team domains, ESPN and CBS Sports.
North Korea’s presence on the internet is commonly perceived as something that only goes one way: hackers go out, nothing gets in. Trend Micro summarizes its findings from studying internet traffic going in and out of North Korea. It reviews its small IP space of 1024 routable IP addresses.
According to an industry survey, 45 percent of small business (SMB) owners believe they’ll never be targeted. This is a dangerous assumption because SMBs are sitting ducks for cyber criminals, and as leaders better understand their risk, they struggle to take action against emerging threats.
It’s an exciting future for sure but, as with everything, it is important to consider the potential “misuse case” as well as the obvious benefits. We are talking about a future where attackers no longer hack a device that you use, but rather hacking your perception of reality.
A couple of common questions that arise whenever cyberpropaganda and hacktivism issues come up: who engages in it? Where do the people acquire the tools, skills, and techniques used? As it turns out, in at least one case, it comes from the traditional world of cybercrime.
Trend Micro Deep Discovery has been recommended for the fourth year in a row by NSS Labs Breach Detection Systems report – scoring an unbeatable 100% detection rate. Powered by XGen™ security, it’s designed to help organizations detect, analyze, and respond to advanced malware.
It started as a small idea. Get a bunch of good people together, away from the pressures of their offices, and see if they could address some of the issues operational security teams have to deal with. It is now Year 4, and Trend Micro is expanding its role to become the lead sponsor of Canada’s GeekWeek.
Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.