Remove 2018 Remove Adware Remove Encryption
article thumbnail

Lumma/Amadey: fake CAPTCHAs want to know if you’re human

SecureList

Our recent research into the adware landscape revealed that this malicious CAPTCHA is spreading through a variety of online resources that have nothing to do with games: adult sites, file-sharing services, betting platforms, anime resources, and web apps monetizing through traffic.

Adware 124
article thumbnail

Mobile malware evolution 2020

SecureList

The word “covid” in various combinations was typically used in the names of packages hiding spyware and banking Trojans, adware or Trojan droppers. Last year was notable for both malware and adware, the two very close in terms of capabilities. Number of adware attacks on mobile users in 2019 and 2020 ( download ).

Mobile 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Scranos – A Cross Platform, Rootkit-Enabled Spyware rapidly spreading

Security Affairs

Although the campaign has not reached the magnitude of the Zacinlo adware campaign, it is already infecting users worldwide.” According to the experts, the operation is in a consolidation stage, first samples date back to November 2018, with a massive spike in December and January. The data sent to the C2 is encrypted with AES.

Spyware 102
article thumbnail

IT threat evolution Q1 2021. Non-mobile statistics

SecureList

If the victim organization is slow to pay up, even though its files are encrypted and some of its confidential data has been stolen, the attackers additionally threaten to carry out a DDoS attack. In addition, we detected an interesting adware program written in the Rust language, and assigned it the verdict AdWare.OSX.Convuster.a. .

Mobile 107
article thumbnail

IT threat evolution Q2 2021

SecureList

Communication with the server can take place either over raw TCP sockets encrypted with RC4, or via HTTPS. com – all generated using RoyalRoad and attempting to exploit CVE-2018-0802. The ransomware supports two encryption modes: one generated dynamically and one using a hardcoded key. We Are Back ?

article thumbnail

Cyberthreats to financial organizations in 2022

SecureList

This ransomware is controlled by command line parameters and can either retrieve an encryption key from the C2 or an argument at launch time. An incident investigation conducted by Kaspersky ICS CERT at one of the attacked enterprises revealed that they exploited a vulnerability in FortiGate VPN servers (CVE-2018-13379).

article thumbnail

IT threat evolution in Q2 2021. PC statistics

SecureList

Microsoft Office exploits most often tried to utilize the memory corruption vulnerability CVE-2018-0802. As in the previous quarter, a total of 15 of the Top 20 threats for macOS are adware programs. Distribution of exploits used by cybercriminals, by type of attacked application, Q2 2021 ( download ). Country*. % of attacked users**.

Adware 116