the original malicious links . The motive behind these attacksAttack.Databreachwas to stealAttack.Databreachcredentials and spyAttack.Databreachon the victims . As per the research , hackers were targeting Educational institutes , Military organization and media companies from Palestine , Israel , Egypt , and the US . SecureUpdate , a malware disguised asAttack.Phishingan Android update was designed to download malicious payloads into the victim ’ s device while the Vamp was focused on stealingAttack.Databreachdata from victims ’ smartphones including call recordings , contact information , and stealingAttack.Databreachother important documents . The malware designed to target Windows operating systemsKasperAgent and Micropsia were capable of downloading other payloads , executing arbitrary commands , stealingAttack.Databreachfiles , capturingAttack.Databreacha screenshot , loggingAttack.Databreachkeystrokes and much more . Essentially the hackers were interested in stealingAttack.Databreachcredentials of the infected devices . At first , no connection was established between the attacks since all the malware were different from each other . On close inspection , however , the security firms found a link . The Same email address was used to register infectious domains which eventually revealed that the attacks were linked after all . Researchers revealed that more than 200 samples of the Windows malware and at least 17 samples of Android malware were discovered which means that potential victims of this malware could be numerous . The researchers at Palo Alto firm stated “ Through this campaign , there is little doubt that the attackers have been able to gainAttack.Databreacha great deal of information from their targets , ” The campaign also illustrates that for some targets old tricks remain sufficient to run a successful espionage campaign , including the use of URL shortening services , classic phishing techniques as well as using archive files to bypass some simple file checks . This is not the first time when a sophisticated malware attack was aimed at the Middle Eastern countries . Just last month StoneDrill malware was discovered targeting not only the Middle East but also Europe . Also , Shamoon malware from Iran is currently targeting Saudi Arabian cyber infrastructure
Unit 42 , Palo Alto Networks ’ threat intelligence research arm , has uncovered evidence of links between attacks using two new malware families and two families of Google Android malware . This has been discovered as part of work on preventing and detecting targeted attacks in the Middle East . The attackers favour using URL shortening services to disguiseAttack.Phishingthe true links they are sendingAttack.Phishingin spear phishing emails . A number of samples analysed were linked via the URL shortening service “ bit.ly ” . The URL shortening service then redirects users to the malicious payload hosted on attacker controlled pages . Another method favoured by the attackers was the setting upAttack.Phishingof fake news sites
In this day and age of online attacks , it becomes all the more important to protect one ’ s computer and other devices against the various threats . Criminals often try to bypass existing security solutions on the device in question , but they also distributeAttack.Phishingfake tools that allegedly prevent these attacks from happening . This trend is called “ rogue security softwareAttack.Phishing, ” and has been proven to be quite successful over the past few years . This rogueAttack.Phishinganti-spyware program is a cloneAttack.Phishingof the Total Virus Protection malware whose origin points to the Russian Federation . The software offers you an option to purchase a license in order to remove those programs when in fact the “ infections ” are critical system files . Many more clones of this software exist , and 2017 variants have been spotted in the wild already . ANG Antivirus only targets Microsoft Windows users , the good news is that it is not too harmful because it ’ s main goal is to scare you into buying a software license . However , some variants have proven to be more harmful and may even stealAttack.Databreachsensitive user information . Do not confuse this “ tool ” with the official Microsoft Security Essentials software , as they are nothing alike . Security Essentials 2010 is a malware strain first discovered in February of 2010 . Its most powerful threat is how the malware prevents users from launching over 150 different programs , including most browsers and the Windows Command Prompt . Unlike ANG Antivirus , Security Essentials uses 3rd party trojans that disguiseAttack.Phishingthemselves as flash updates that are required to view online videos . Once baitedAttack.Phishing, the trojan will install a number of malware including Security Essentials 2010 . Similar to the previous scareware , this one will also prompt you to purchase a license to supposedly remove quite a few threats , all of which are obviously fake . Thankfully , this malware has not been reported of stealingAttack.Databreachpersonal information or any more sensitive info and is no longer an active threat . The funny part about this program is that it started asAttack.Phishinga legitimate anti-spam system that tried to automate the complaint process for email spam . The program would allow for a user to send a complaint about a spam email to the software . However , some say that the program collectedAttack.Databreachthe list of emails in order to sell it to other spammers as a fresh list of targets . It did not take long for this security tool to get shut down completely , which occurred in May of 2006 . The company bailed after a thread popped up on a security forum accusing Blue Security of initiating a massive spam attackAttack.Phishingon it ’ s users , Blue Frog was gone one week later . Macintosh users are also in need of proper security tools to keep their computer safe from harm . Mac Defender tried to fill this need , even though its developers had less honorable intentions . It was the first major malware threat to MacOS , its object was to trickAttack.Phishingusers into paying the license fee , ranging between US $ 59 and US $ 79 . Moreover , the malware collectedAttack.Databreachpayment card information used for the license and would use that for further fraudulent purposes . Do not be fooled into thinking this is a software tool that will keep a computer safe from spyware . Instead , the Zinaps software wants to performAttack.Phishingfake computer scans and trickAttack.Phishingusers into buying a license . This is a very common theme among rogueAttack.Phishingsecurity software , as most developers hope to make a lot of money by tempting users into paying for their useless creations . What makes this malware so dangerous is that Zinaps would edit the Windows Registry , ensuring the software runs as soon as the computer boots up . It also makes removing the software much harder and almost almost always leaves traces after its gone . This scareware rogueAttack.Phishingsecurity program will not fixVulnerability-related.PatchVulnerabilityany issues related to Windows or otherwise . Once again , this malware wants to force users to buy a license , while not offering any help with real security issues whatsoever .