Tag Archive for: Check

Over 400 million Android users at risk as dangerous malware found in 101 apps: Check full list and delete now


By Divya Bhati: Researchers have flagged a new highly dangerous malware that has infected more than 100 apps on Google Play Store. Security researchers at Dr. Web, with BleepingComputer have discovered a new spyware called ‘SpinOK’ which has infected over 100 android applications available for download. What makes the situation more concerning is that these apps have been downloaded 421,290,300 times and this puts a significant number of Android users at risk of cyber threat.

While Google has been informed about the issues and reportedly removed the apps, researchers have advised users to delete these apps, take precautions, and refrain from downloading any similar apps in the future.

What is SpinOK malware

Revealing more about ‘SpinOK’, the study cites that this trojan malware disguises itself as an advertisement SDK and appears to be legitimate by offering mini-games with daily rewards to attract users. However, once downloaded, the malware steals private data stored on users’ devices and sends it to a remote server. The report further reveals that the infected apps had varying levels of malicious content, with some still containing harmful software, while others had specific versions or were completely removed from the store.

“On the surface, the SpinOk module is designed to maintain users’ interest in apps with the help of mini-games, a system of tasks, and alleged prizes and reward drawings,” the report by Doctor Web reveals.

Delete these Android apps

Here is the list of top 10 apps which are infected with malware:

  1. Noizz- video editor with music (at least 100,000,000 downloads).
  2. Zapya – File Transfer, Share (at least 100,000,000 downloads ; the trojan module was present in version 6.3.3 to version 6.4 and is no longer present in current version 6.4.1).
  3. VFly: video editor&video maker (at least 50,000,000 downloads).
  4. MVBit – MV video status maker (at least 50,000,000 downloads).
  5. Biugo – video maker&video editor (at least 50,000,000 downloads).
  6. Crazy Drop (at least 10,000,000 downloads).
  7. Cashzine – Earn money reward (at least 10,000,000 downloads).
  8. Fizzo Novel – Reading Offline (at least 10,000,000 downloads).
  9. CashEM: Get Rewards (at least 5,000,000 downloads).
  10. Tick: watch to earn…

Source…

Check Point reveals top malware and vulnerabilities in April 2023


Check Point Software Technologies, a provider of cybersecurity solutions globally, has published its Global Threat Index for April 2023.

Last month, researchers uncovered a substantial Qbot malspam campaign distributed through malicious PDF files attached to emails seen in multiple languages.

Meanwhile, Internet-of-Things (IoT) malware Mirai made the list for the first time in a year after exploiting a new vulnerability in TP-Link routers, and Healthcare moved up to become the second most exploited industry, Check Point finds.

The Qbot campaign seen last month involves a new delivery method in which targets are sent an email with an attachment that contains protected PDF files. Once these are downloaded, the Qbot malware is installed on the device. Researchers found instances of the malspam being sent in multiple different languages, which means organizations can be targeted worldwide.

Last month also saw the return of Mirai, one of the most popular IoT malwares. Researchers discovered it was exploiting a new zero-day vulnerability CVE-2023-1380 to attack TP-Link routers and add them to its botnet, which has been used to facilitate some of the most disruptive distributed DDoS attacks on record. This latest campaign follows an extensive report published by Check Point Research (CPR) on the prevalence of IOT attacks.

There was also a change in impacted industries, with healthcare overtaking government as the second most exploited sector in April. Attacks on healthcare institutions have been well documented and some countries continue to face constant assaults. For example, cyber criminal group Medusa recently launched attacks on cancer facilities in Australia.

The industry remains a lucrative target for hackers as it gives them potential access to confidential patient data and payment information. It could have implications for pharmaceutical companies as it could lead to leaks regarding clinical trials or new medical drugs and devices.

Maya Horowitz, VP Research at Check Point Software, says, “Cyber criminals are constantly working on new methods to bypass restrictions and these campaigns are further proof of how malware adapts to survive.

“With Qbot on the…

Source…

Billions of Android and iPhone owners urged to check signs a criminal is hiding in your device – don’t lose everything


SECURITY experts have warned smartphone users about major signs that criminals are hoping to hack their device.

Androids and iPhones are pretty safe gadgets but no device is fully hackproof, according to cybersecurity experts at Trend Micro.

Hackers have several techniques when it comes to infiltrating smartphonesCredit: Getty

They wrote in a recent blog post: “Unfortunately, no device can ever be 100% hackproof, and the iPhone is no exception.”

The blog lists three potential ways that a hacker can infiltrate your phone.

They’re all pretty common and you may have some of the red flags on your device right now.

EVIL APPS

The first hacking route the experts pointed out was “malicious apps.”

It’s normal to download apps onto your smartphone, but cybercriminals rely on you not checking what you’re downloading.

You have to be wary of all apps you download onto your device and make sure you’ve double checked the permissions that they want to access.

Try reading the apps reviews and only downloading from the Google Play Store or Apple App Store.

DANGEROUS WI-FI

The Trend Micro experts also warned against using insecure Wi-Fi networks, especially public Wi-Fi.

Most read in Phones & Gadgets

Cybercriminals can take advantage of your need to be online and steal data from your device.

Even the FBI has warned to be wary of public Wi-Fi.

“Preventing internet-enabled crimes and cyber intrusions requires each of us to be aware and on guard,” the FBI wrote in a recent announcement.

“Be careful when connecting to a public Wi-Fi network and do not conduct any sensitive transactions, including purchases, when on a public network.”

PHISHING MESSAGES

The third threat on the list could be lurking in your email app or text message inbox.

Phishing emails and texts sit waiting on devices, often containing dangerous links, and attachments.

Delete any suspicious messages without clicking on links or revealing any private information.

Source…

Five signs to check for Android users


Phone hacking: Five signs to check for Android users
  • Phone hacking is common, especially among Android devices, so users need to check now and then for signs of device compromise.
  • Hackers often target Android devices as its operating system powers many mobile devices today.

Hacking of a phone is more commonplace today than it ever was before, and a check online shows that devices powered by the Android operating system are still far more vulnerable than its counterpart, the iOS. Android has had a long journey toward securing its app store, the Play Store since developers are granted more freedom.

For starters, Android’s open Google Play Store marketplace has far more apps to choose from than Apple’s App Store. Android devices also rely on open-source code, meaning that the owners of these devices can tinker with the operating system of their phones and tablets. 

But, hacking is more possible if the phone runs on Android, and without proper checking, there’s a far greater chance that hackers can distribute malware through malicious apps. Statistics over the years also prove that Android remains the top target for internet attacks despite the progress in security measures. 

To top it off, since the world has mainly gone mobile, so have fraudsters. Of the world’s cyberattacks, around 60% are initiated on mobile devices, according to RSA Security. What is more alarming is the fact that about 80% of attacks against mobile devices take place via apps. 

A separate statistic by Kaspersky shows that over 98% of mobile banking attacks target Android devices, which is no surprise. “Android is the most popular mobile platform in the world (over 80% of the global smartphone market). Also, Android is the only popular mobile platform that allows users to side-load software,” Kaspersky said.

As for iOS, every app on the Apple App Store has always been closely inspected, to begin with. That practice has reduced the number of apps available and helped reduce malware-riddled apps and security issues. But iOS being considered more secure doesn’t mean cybercriminals can’t hit Apple devices with malicious software.

How to check if there was hacking on your…

Source…