Tag Archive for: Christmas.

Delete ‘Christmas Sticker’ Joker App Now: 3 Steps to Remove Malware


A new alert is being issued to all Android users who like downloading apps. They should be careful of the Joker malware, which is a malicious program that can steal personal information and force extra charges on an infected device.

For most Android users, downloading apps from the Google Play Store is a safe and secure method. This is because of its built-in Play Protect system that keeps track of harmful programs.

Unfortunately for Android users, the infamous Joker malware has proven time and again that it can evade the Google Play Store antivirus. The malware was recently spotted in the Android app “Christmas Stickers.”

Christmas Sticker: A Joker App

According to earlier reports, the Joker malware has deceived more than 500,000 Android users up to date. It was initially spotted in an app called Color Message.

This malicious malware also hid inside apps like: Beauty Camera Phone Editor, Battery Charging Animation Wallpaper and Multi-Language Keyboard, OneSuper Launcher, Simple Blood Suga and Colorful Wallpaper.

More recently, malware analyst Tatyana Shishkova identified the Joker code on the app Christmas Stickers. There were, unfortunately, more than 1,000 installations of the app since December 21, 2021.

Joker Malware: Android Issues

Once installed, the Joker app activates malware that is difficult to detect and contain. It sometimes disguises itself as a legitimate app icon, which fools most mobile security.

Joker malware starts its attack by gaining access and permission over the infected device. This lets it install a few more viruses which help it run its programs smoothly.

Afterward, Joker malware manipulates the device’s SMS functions to subscribe to unwanted premium services. This forces victims to pay a significant bill to their communications provider.

Lastly, the Joker malware tries to mine all available credentials on the device, like the user’s account and passwords. Be warned that information like this is often sold on the dark web for scam and phishing purposes.

Read Also: iPhone 14…

Source…

Ransomware attack threatens paychecks just before Christmas


A major payroll company has been crippled by ransomware hackers, leaving some companies around the country scrambling to cover employees’ last paychecks before Christmas and many workers wondering if they’ll get paid on time.

Kronos, one of the largest workforce management companies in the U.S., was hit with ransomware Saturday, according to the company’s public updates page, and announced Monday that its programs that rely on cloud services — which a number of companies use to pay employees and manage their hours — would be unavailable for “several weeks.”

For many Americans who are paid biweekly, Dec. 17 is the final payday before Christmas.

A spokesperson for Kronos declined to name which ransomware group was responsible, whether the company planned to pay, how much the hackers demanded or to provide a full list of customers that use its cloud services and were affected.

A number of major companies, including Whole Foods, GameStop and Honda, as well as state and local government agencies like the state of West Virginia and city of Cleveland, rely on Kronos for payroll and scheduling services for their employees.

“There is a real fear about our paychecks this upcoming Friday,” said one Whole Foods employee, who requested not to be named out of fear of reprisal.

“Whole Foods has instructed us to use a paper punch sheet to keep track of our hours & our Team Leads have been instructed to hand write the schedule, since the schedule writing system is also down,” she said in an email.

Rachel Malish, a spokesperson for Whole Foods, said that the company sent a memo to employees Wednesday that it had found a way to pay all employees on Friday.

GameStop didn’t respond to requests for comment.

A number of healthcare companies and hospitals rely on Kronos for scheduling and payroll.

Ascension, one of the largest hospital chains in the U.S., has been forced to “put in place alternate systems to track time and process payroll as scheduled,” said Gene Ford, a company spokesperson.

John Riggi, the senior advisor for cybersecurity at the American Hospital Association, an industry group, said that he had spoken with multiple hospitals that have had to create contingency plans…

Source…

The Log4J Software Flaw Is ‘Christmas Come Early’ for Cybercriminals


Researchers have just identified a security flaw in a software program called Log4J, widely used by a host of private, commercial and government entities to record details ranging from usernames and passwords to credit card transactions. Since the glitch was found last weekend, the cybersecurity community has been scrambling to protect applications, services, infrastructure and even Internet of Things devices from criminals—who are already taking advantage of the vulnerability.

“For cybercriminals this is Christmas come early, because the sky’s the limit,” says Theresa Payton, a former White House chief information officer and the CEO of Fortalice Solutions, a cybersecurity consulting company. “They’re really only limited by their imagination, their technical know-how and their own ability to exploit this flaw.” Payton spoke with Scientific American about what Log4J does, how criminals can use its newly discovered weakness, and what it will take to repair the problem.

[An edited transcript of the interview follows.]

What is Log4J, and how is it used?

In both technology and cybersecurity teams, everybody needs really good logs. You need logging for audit trails, in the event of a ransomware event, to do forensics, sometimes for regulatory considerations. And so [Log4J] is a Java feature and function where you log things. You could log the fact that somebody used this particular type of credit card, you could log the fact that somebody just logged in today, any number of different types of events could be captured.

But Log4J has a major security flaw.

This type of vulnerability means somebody can inject instructions into the logs and make the logs do anything they want them to do. Researchers discovered this vulnerability—and I always say thank goodness for the researchers—in early December. Basically, it allows an attacker to have unauthenticated remote code access to the servers. So they can send instructions, they can execute things, and potentially do it completely undetected. There’s already been examples of where attackers have leveraged the Log4J vulnerability. They’ve installed cryptocurrency mining malware on unknowing machines. If we recall the…

Source…

How to stay confident when shopping online this Christmas – Back End News


According to a recent survey conducted by Kaspersky, Filipinos are the top new e-cash adopters in the Asia Pacific region at 37% followed by India (23%) and Australia (15%). Survey respondents from the region said they have used digital payments primarily because of the convenience it offers.

The pandemic has ushered in an extraordinary online shopping experience where window-shopping (checking out products), comparing prices before buying, and having the goods delivered right on the customer’s doorstep can all be done at home anytime with just one click.

“The pandemic has triggered more people to embrace online shopping,” said Chris Connell, Managing Director for Asia Pacific at Kaspersky. “Although physical safety is essential, the safety of our finances, devices, and information is also important, especially as phishing scams become more and more sophisticated and targeted. We expect cybercriminals to continue using tricks that will lure more victims to take the bait hence this festive season, we urge everyone to put their guards up against messages, calls, and even emails asking for critical information such as account number, OTPs, passwords, and more.”

Kaspersky develops cybersecurity policy for bionic devices
Kaspersky sees more attacks on financial systems, cryptocurrency industry in 2022

Unfortunately, this rise in digital adoption is where cybercriminals are directing their efforts to. The recently reported sim-swap incident worth almost P2 million in just one attempt is an example.

Sim-swap is a scam used to intercept online banking SMS verification codes. To get hold of one-time passwords for financial transactions, cybercriminals create or fraudulently obtain a copy of the victim’s SIM card from the mobile operator. It’s no surprise that a third of the survey respondents (31%) in APAC admitted being concerned about losing money when it comes to making online transactions.

Here are some practical tips from Kaspersky for online shopping:

  • Stick to familiar brands you know or have heard of.
  • If you’re checking out a new brand, research it carefully and get its contact details like email, phone number, or address. Also, look for its…

Source…