The banking trojan keeps switching up its lies, trying to fool Android users into clicking on a fake Flubot-deleting app or supposedly uploaded photos of recipients.
Threatpost
Posts tagged "Malware"
Gamers Beware: Malware Hunts Steam, Epic and EA Origin Accounts
The BloodyStealer trojan helps cyberattackers go after in-game goods and credits.
Threatpost
TangleBot Malware Reaches Deep into Android Device Functions
The mobile baddie grants itself access to almost everything, enabling spying, data-harvesting, stalking and fraud attacks, among others.
Threatpost
AT&T Phone-Unlocking Malware Ring Costs Carrier $200M
With the help of malicious insiders, a fraudster was able to install malware and remotely divorce iPhones and other handsets from the carrier’s U.S. network — all the way from Pakistan.
Threatpost
Cyberattackers Embrace CAPTCHAs to Hide Phishing, Malware
CAPTCHA-protected malicious URLs are snowballing lately, researchers said.
Threatpost
Discord CDN and API Abuses Drive Wave of Malware Detections
Targets of Discord malware expand far beyond gamers.
Threatpost
‘Oddball’ Malware Blocks Access to Pirated Software
Rather than steal credentials or hold data for ransom, a recent campaign observed by Sophos prevents people from visiting sites that offer illegal downloads.
Threatpost
Exchange Servers Targeted by ‘Epsilon Red’ Malware
REvil threat actors may be behind a set of PowerShell scripts developed for encryption and weaponized to exploit vulnerabilities in corporate networks, the ransom note suggests.
Threatpost
IOTW: Scripps Health Malware Attack Could Cost Lives
Scripps is not discussing the attack, nor is it providing any meantime to recovery (MTTR) estimate. The uncertainty and tight-lipped nature of the incident is not a surprise to anyone in the cyber sec…
IOTW: Malware Mainstay QBot Targets Election Insecurities With New Phishing Camp…
Cyber crime software is becoming streamlined and automated as cyber crime campaigns succeed and funding increases. This enables increasingly nuanced and psychological cyber crime campaigns.