In perhaps a bit of irony, the humor website cracked.com was flagged by Google’s Safe Browsing Technology.
Cracked.com is a website derived from the original “Cracked” magazine back in the 1950′s. The website was formed in 2007 and has been making people laugh ever since. At least until it started infecting computers. Continue reading
Mobile devices have become targets for malware and researchers alike, the latest news is on how our devices can be exploited to capture PIN codes. Researchers Laurent Simon and Ross Anderson from the University of Cambridge have created an app, PIN Skimmer, using the camera and microphone to capture the codes. Continue reading
The Android Trojan Svpeng, first reported by Kaspersky, has some new functionality and is now capable of phishing and stealing banking information.
The phishing capability is interesting. It waits on a targeted banking app or the Play Store app to launch, then a phishing window opens to requests credit card information, The information is then sent to a remote server.
image: Kaspersky Labs
The Trojan’s themselves are disguised as Adobe Flash Player apps for Android. This is clever since Adobe stopped distributing Flash in the Play Store last year in an effort to move to HTML5.
Copies of Flash Player are still being distributed on file sharing sites and third-party markets — a super easy way to disguise malware is as a legitimate app.
Svpeng has been found to target Russian banks so far, but could easily spread to others if the malware is a success.
So far, 2013 has really seen a progression in banking Trojans targeting Android — the number has grown and so have the tactics they’re using.
These Trojans are likely found where you don’t roam, but just to be safe stick to trusted markets and review apps before installing.
Malwarebytes Anti-Malware Mobile detects this trojan as Android/Trojan.SMS.Svpeng
You can find the legitimate versions of Adobe Flash Player for Android here.
Kaspersky’s story on Svpeng can be found here.
Google removed the app iMessage Chat for Android from the Play Store yesterday after discovering it’s not exactly what it claims to be.
The iMessage for Apple products allows users to send text messages via WiFi for free without incurring the charges or limitations we typically see with a phone plan. It’s a popular app and I can see how an Android version could be well received, with some iPhone users switching to Android.
According to researchers, the suspicious iMessage app could potentially steal Apple ID’s, passwords and is capable of downloading additional APKs.
Along with stealing credentials it could capture your SMS messages, which might contain confidential data you probably don’t want being exposed or sold.
Security company VUPEN revealed a vulnerability in Java’s Preloader in early July that’s quite likely the same one being integrated into cyber criminals’ exploit kits.
According to VUPEN’s report, the vulnerability is “caused by a design error in the Java click-2-play security warning when the preloader is used, which can be exploited by remote attackers to load a malicious applet (e.g. taking advantage of a Java memory corruption vulnerability) without any user interaction.”
The flaw which affects Java version 7 update 21 and earlier bypasses the traditional security warning displayed before an applet is allowed to run: