HITBSecConf2017 Amsterdam (April 10th - 14th)
Register Online Now!
Viruses & Malware
The most common way for threat actors to compromise a network router is to attack it directly. The other and potentially more scalable way is to try and get individual users to unwittingly do it for them.
Security researchers at Kaspersky Lab have discovered a dangerous new Trojan dubbed Switcher that is designed to infect and hijack WiFi routers via compromised Android end user devices.
Planned operations and outpatient appointments have been cancelled at three hospitals in northeastern England after a computer virus infected a health service network, the National Health Service Trust said.
In a post on its website, the Northern Lincolnshire and Goole NHS Foundation Trust called the attack a "major incident" and said it had cancelled all planned operations, outpatient appointments and diagnostic procedures for Wednesday.
The miscreants behind the Nymaim malware dropper have updated their code to include better obfuscation and blacklisting against security software.
Analytics outfit Verint, which discovered the latest version and offers its analysis here, says the new code base targets phishing rather than the drive-by-download approach favoured by the original version of the malware.
A new mobile malware known as "CallJam" loves to continuously hit up premium phone numbers from the Android devices it infects.
Just like other Android trojans (such as Android.Xiny.19.origin and the DroidJack remote access tool), CallJam likes to masquerade as downloadable games in the official Google Play Store.
Specifically, this particular malware takes the form of a game called "Gems Chest for Clash Royale." As many as 500,000 people have downloaded the malicious app since someone first uploaded it to the Google Play Store back in May 2016.
Malware is nothing new, yet malware infections are on the rise – but why is that? Why aren’t the defences we have been putting in place for the past 20 years effective? Let’s look at why.
Malware creation is no longer in the hands of expert hackers. Anybody with a computer can make their own custom malware, given the prolific rise in malware-creation kits. Buy the software, point, click and you have your own custom malware. You can hide it in a PDF, a Microsoft Word document or ZIP file.