malware

Latest

  • Omar Marques/SOPA Images/LightRocket via Getty Images

    'SimBad' Android adware was downloaded nearly 150 million times

    by 
    Jon Fingas
    Jon Fingas
    03.13.2019

    As much as Google has done to keep malware out of the Play Store, some notable examples still get through. Google has pulled 210 apps from the store after Check Point researchers discovered that they were infected with the same strain of adware. Nicknamed "SimBad" based on the abundance of infected simulator games, the code hid in a bogus ad-serving platform and created a back door that could install rogue apps, direct users to scam websites and show other apps in stores. Check Point believes the apps' developers were tricked into using the platform.

  • solarseven via Getty Images

    Ryuk ransomware banks $3.7 million in five months

    by 
    Jon Fingas
    Jon Fingas
    01.14.2019

    The Ryuk ransomware hasn't just causing grief for newspapers -- it's also quite lucrative for its operators. Researchers at CrowdStrike and FireEye both estimate that the code has produced the equivalent of $3.7 million in bitcoin since August, spread across 52 payments. The key, analysts note, is the willingness to be patient and focus on big targets.

  • Chris Velazco/Engadget

    Over a dozen iPhone apps talked to a known malware server

    by 
    Jon Fingas
    Jon Fingas
    01.07.2019

    Apple's App Store has generally had fewer security concerns than the Google Play Store, but that hasn't stopped questionable apps from slipping through the cracks. Security researchers from Wandera have discovered 14 games that all communicated with the same server used to control Golduck malware for Android. While the apps themselves appeared innocuous, they were loaded with ads. It would have been feasible to use ads to trick users into granting permission for malware installed outside the App Store, Wandera told TechCrunch.

  • Saul Loeb/AFP/Getty Images

    NSA will release a free tool for reverse engineering malware

    by 
    Jon Fingas
    Jon Fingas
    01.06.2019

    The NSA has frequently been accused of holding on to info that could potentially improve security, but this time it's being a little less secretive. The agency is planning to release a free reverse engineering tool, GHIDRA, in tandem with the RSA Conference on March 5th. The software dissects binaries for Android, iOS, macOS and Windows, turning them into assembly code that can help analyze malware or pinpoint questionable activity in otherwise innocent-looking software.

  • AP Photo/Richard Vogel

    Malware stalls delivery of LA Times and other major US newspapers

    by 
    Jon Fingas
    Jon Fingas
    12.30.2018

    If you still look forward to reading a physical newspaper now and then, you might have been in for a rude surprise this weekend. An unspecified malware strain has attacked Tribune Publishing's network, delaying the release of Saturday editions of at least some of its papers (including the LA Times, San Diego Union Tribune and South Florida Sun Sentinel) as well as West Coast versions of the New York Times and Wall Street Journal, both of which are printed at the LA Times' Los Angeles plant. It was particularly severe for San Diego residents -- between 85 to 90 percent of Saturday papers didn't reach customers.

  • LightFieldStudios via Getty Images

    FBI and Google dismantle multi-million dollar ad fraud scheme

    by 
    Rachel England
    Rachel England
    11.28.2018

    A massive ad-fraud operation that hijacked nearly two million devices and involved 5,000 counterfeit websites has been dismantled by the FBI, Google and bot-detection firm White Ops. The eight men involved in the scheme are facing charges -- three have been arrested and five remain at large.

  • Engadget

    Windows' built-in antivirus tool can run in a secure sandbox

    by 
    Jon Fingas
    Jon Fingas
    10.27.2018

    Antivirus programs, by their nature, introduce a degree of risk. Since they have to scan malicious data to stop attacks (and thus need extensive permissions), a piece of malware that exploits antivirus flaws can typically run with impunity. That could be much more difficult if you're using Windows 10's built-in safeguards, though. Microsoft is gradually rolling out a Windows Insider preview where Defender Antivirus has the option of running in a sandbox -- the first "complete" solution to do this, the company said. Should the worst happen and malware targets Defender Antivirus, any hostile actions will be limited to the antivirus tool's environment instead of running amok on your PC.

  • Dpa

    Fake Flash updates upgrade software, but install crypto-mining malware

    by 
    Imad Khan
    Imad Khan
    10.13.2018

    According to cybersecurity firm Palo Alto Networks, it discovered a fake Flash updater that has been duping conscientious computer users since August. The fake updater installs files to sneak a cryptocurrency mining bot called XMRig, which mines for Monero. But here's the catch, while the fake updater is installing the XMRig malware, it's also updating the user's Flash.

  • Getty Images/iStockphoto

    Kelihos botnet operator pleads guilty to hacking and fraud charges

    by 
    Jon Fingas
    Jon Fingas
    09.13.2018

    The Kelihos botnet story appears to be winding to a close. Russian Peter Levashov has pleaded guilty to charges relating his operation of the botnet, including intentional damage to a computer, wire fraud, conspiracy and identity theft. He reportedly used Kelihos to spread spam email, collect login details, install ransomware and otherwise attack users' computers, including selling access to the botnet.

  • AOL/Dana Wollman

    Top-grossing Mac App Store app steals users’ browser histories

    by 
    Mallory Locklear
    Mallory Locklear
    09.07.2018

    Adware Doctor is a top app in Apple's Mac App Store, sitting at number five in the list of top paid apps and leading the list of top utilities apps, as of writing. It says it's meant to prevent "malware and malicious files from infecting your Mac" and claims to be one of the best apps to do so, but unbeknownst to its users, it's also stealing their browser history and downloading it to servers in China.

  • Omar Marques/SOPA Images/LightRocket via Getty Images

    Android exploit targeted apps' shoddy use of external storage

    by 
    Jon Fingas
    Jon Fingas
    08.12.2018

    Many mobile security flaws revolve around obvious avenues like websites or deep, operating system-level exploits. The security team at Check Point, however, has discovered another path: apps that make poor use of external storage like SD cards. While apps would ideally stick to internal storage (which Google sandboxes against outside influence) as much as possible, some apps have relied unnecessarily on unprotected external storage and didn't bother to validate the data coming from that space. An intruder could take advantage of that poor security policy to manipulate the data and cause havoc -- Check Point called it a "man-in-the-disk" attack.

  • Stringer . / Reuters

    TSMC says virus that shut down its plants is a WannaCry variant

    by 
    Mallory Locklear
    Mallory Locklear
    08.06.2018

    Over the weekend, chip manufacturer TSMC reported that some of its fabrication plants had to be shut down because of a virus that had infected the company's systems. While some were able to resume operations quickly, others were out of commission for up to a day. Now, TSMC has blamed a WannaCry variant for the disruption. Bloomberg reports that the company has resumed full operations but shipment delays are expected.

  • Reuters/Pichi Chuang

    Chip giant TSMC struggles with virus infections at its factories

    by 
    Jon Fingas
    Jon Fingas
    08.04.2018

    Many of the tech products launching this fall might have just run into production setbacks. Giant chip manufacturer TSMC has warned that several of its fabrication plants suffered virus infections on August 3rd, disrupting production. Some of these plants recovered in a "short period of time," it said, but others wouldn't resume business as usual for "one day." The company dismissed claims that this was a hack, but didn't initially provide details about the virus or the potential infection path.

  • Getty Images

    Three men arrested for stealing over 15 million payment cards

    by 
    Mallory Locklear
    Mallory Locklear
    08.01.2018

    US officials announced today that three alleged leaders of the cybercrime group known alternatively as Fin7, Carbanak and the Navigator Group have been arrested in Germany, Poland and Spain and charged with 26 felony counts. The charges include conspiracy, wire fraud, computer hacking, access device fraud and aggravated identity theft. The Department of Justice alleges that Fin7 members have targeted more than 100 US companies, hacked thousands of computer systems and stolen 15 million credit and debit card numbers. The group is said to have breached networks in 47 states and Washington, DC and hacked 6,500 point-of-sale terminals at over 3,600 business locations.

  • Chinese 'hackers' try to attack state governments by mailing CDs

    by 
    Jon Fingas
    Jon Fingas
    07.30.2018

    How do you infiltrate US government computers when security experts are increasingly aware of your hacking campaigns? Send old-fashioned mail, apparently. The Multi-State Information Sharing and Analysis Center has warned officials of a China-based campaign that mails CDs loaded with malware. State institutions have received China-postmarked envelopes containing both discs with virus-laden Word documents as well as nonsensical letters. While it's not clear what the exact intent was, it looks as if the 'hackers' hoped to make their campaign seem more plausible by sending something physical.

  • Patrick T. Fallon/Bloomberg via Getty Images

    That 'Fortnite' cheating app is probably hiding malware

    by 
    Jon Fingas
    Jon Fingas
    07.02.2018

    Malware writers and scammers love to exploit demand for popular games to ensnare unwitting victims, and that's truer than ever for a near-ubiquitous game like Fortnite. Rainway has discovered malicious Windows adware hiding in a cheat that promised both an aimbot and free in-game V-Bucks. Install it and it immediately alters Windows to serve its own rogue ads, creating a man-in-the-middle attack (with Rainway as an unwitting participant) by loading its own root certificate and routing all internet traffic through a proxy.

  • Reuters/Dado Ruvic

    Google adds anti-tampering DRM to Android apps in the Play Store

    by 
    Jon Fingas
    Jon Fingas
    06.24.2018

    Google has made a small change to Play Store apps that could prove a significant help to the security of your Android phone. The company is now adding a "small amount" of security metadata to Android APKs to be sure that they were distributed through the Play Store or an approved channel. This will make it possible to verify an app even you're offline, Google said, making it possible to officially add that title to your store library and receive updates through Google's portal. It's digital rights management by another name, as Android Central observed, but that doesn't necessarily mean there's reason to panic -- it may ultimately be helpful, even if there are legitimate concerns.

  • Reuters/Pawel Kopczynski

    Olympic hackers may be attacking chemical warfare prevention labs

    by 
    Jon Fingas
    Jon Fingas
    06.19.2018

    The team behind the 2018 Winter Olympics hack is still active, according to security researchers -- in fact, it's switching to more serious targets. Kaspersky has discovered that the group, nicknamed Olympic Destroyer, has been launching email phishing attacks against biochemical warfare prevention labs in Europe and Ukraine as well as financial organizations in Russia. The methodology is extremely familiar, including the same rogue macros embedded in decoy documents as well as extensive efforts to avoid typical detection methods.

  • EFE

    US government finds new malware from North Korea

    by 
    Devindra Hardawar
    Devindra Hardawar
    06.15.2018

    Even though Donald Trump is on good terms with North Korea, the Department of Homeland Security is still following that country's ongoing cyberattack campaign (which it's dubbed "Hidden Cobra"). Now CNN reports there's a new variant of North Korean malware to look out for: Typeframe. In a report released yesterday, the DHS says it's able to download and install additional malware, proxies and trojans; modify firewalls; and connect to servers for additional instructions. These are attacks we've seen in plenty of malware variants, Typeframe is just the latest addition.

  • .RGB./Flickr

    Android malware is infecting Amazon Fire TVs and Fire Sticks

    by 
    Rachel England
    Rachel England
    06.12.2018

    If you've loaded any apps onto your Amazon Fire TV or Fire TV Stick that let you watch pirated movies and TV shows, you could be at risk from a cryptocurrency-mining Android virus. AFTVnews reports that the virus -- a malware worm variant -- is not specifically targeting Fire TV devices, but they're vulnerable because of their Android-based operating system.