Threat actors continuously adapt and improve their malicious attempts despite innovations in cybersecurity.
In today’s world, there are trojans built explicitly for the Android operating system and are specially-crafted programs designed to look like legitimate programs.
Romanian cybersecurity technology company Bitdefender identified the top trojans targeting Android and published its findings in its August Bitdefender Threat Debrief (BDTD). The BDTD is a monthly series that provides insights into threat news, trends and research from the previous month.
On the top of the list is Downloader. DN. These trojans are repacked applications from the Google Playstore App and include aggressive adware. The adware would then allow the download of malware.
Second on the list is SMSSend.AYE is malware that attempts to register as the default SMS app by requesting the consumer’s consent. Once achieved, it collects incoming and outgoing messages and forwards them to a Command & Control (C&C) server.
Triada.LC is malware that gathers device information like device and subscriber IDs and MAC addresses and sends it to a malicious C&C server, which would respond by sending a link to a payload that the malware downloads.
Banker.ZX is another trojan identified in the report. Threat detectors develop applications that pose as legitimate banking apps that can also imitate conversations with customer support. Like other trojans, it asks for permissions to access contacts, microphone, geolocation and camera.
The BDTD also included the top 205 ransomware families identified where WannaCry gained the most detections at 37%, followed by Robin at 20% and GandCrab at 11%.
The report also includes the countries most impacted by ransomware. Though ransomware was detected in 151 countries in the company’s dataset, most attacks were detected in the United States, Brazil, India, Iran and Germany.
In addition, Bitdefender uncovered that most ransomware attacks are still opportunistic. The company also released research about a new Google Play campaign that bypasses security checks allowing the delivery of potentially malicious content and advertisements. It discovered that 35 apps on the Google Play Store utilised techniques to avoid storefront security checks.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...