Viruses & Malware
A new mobile malware known as "CallJam" loves to continuously hit up premium phone numbers from the Android devices it infects.
Just like other Android trojans (such as Android.Xiny.19.origin and the DroidJack remote access tool), CallJam likes to masquerade as downloadable games in the official Google Play Store.
Specifically, this particular malware takes the form of a game called "Gems Chest for Clash Royale." As many as 500,000 people have downloaded the malicious app since someone first uploaded it to the Google Play Store back in May 2016.
Malware is nothing new, yet malware infections are on the rise – but why is that? Why aren’t the defences we have been putting in place for the past 20 years effective? Let’s look at why.
Malware creation is no longer in the hands of expert hackers. Anybody with a computer can make their own custom malware, given the prolific rise in malware-creation kits. Buy the software, point, click and you have your own custom malware. You can hide it in a PDF, a Microsoft Word document or ZIP file.
Once again, BitTorrent client Transmission has distributed malware to some users through an altered installer, with downloaders of the software on Aug. 28 and 29 probably infected by the "Keydnap" package.
The previous version of Keydnap required users to click on a maliciously formed file, which then opened the installer in Terminal. The malware then waited to install until the next app was launched, and popped up a dialog box asking for authentication.
HEI Hotels has issued a notice alerting its customers about a credit card breach. The company first became aware of the issue when its bank card processor told it there was a possible security issue at play. HEI Hotels initiated what it says was an “extensive forensic investigation,” which turned up malware installed on payment processing systems at certain hotels. The current list of affected locations includes hotels under the Marriott, Hyatt, and Westin chains, among others.
New analysis of the command and control panel and attack mechanisms of the Dridex banking Trojan shows the malware is being used in a wider range of malicious campaigns -- and likely by a different set of threat actors than before.
Spain-based security vendor buguroo says it recently was able to leverage a surprisingly easy-to-exploit weakness in the C&C infrastructure of Dridex to gain unprecedented visibility into how exactly the malware is being used.