Panda Security researchers have been following and analyzing ransomware attacksAttack.Ransomthat have been targeting European business for a few months now , and have tied them to the same group . Through it , the attackers can chose which contact email to provideAttack.Ransomto the victim in the ransom message , which files and folders will be encrypted , whether the malware will autodelete after the encryption process , and so on . These attacks are a definite indication that the Ransomware-as-a-Service trend is gaining momentum , and ransomware-wielding crooks don ’ t need to be extremely skilled to perform the attacks . In these specific cases , securing RDP servers is critical , and can be done by either making them inaccessible from the Internet , or by employing long and hard-to-guess passwords and two factor authentication for user accounts with remote access . Encrypting the remote connection is also a good idea . Vulnerable RDP servers provide attackers with a perfect staging point within the organization ’ s network . From there , they can find more information about the machines on the network , and make a more informed decision about which of them hold information and files that are crucial for the firm
Trend Micro has identified more malicious Android apps abusing the name of the popular mobile game Super Mario Run . We earlier reported about how fake apps were using the app ’ s popularity to spread ; attackers have now released versions of these fake apps that stealAttack.Databreachthe user ’ s credit card information . Super Mario Run is a mobile game that Nintendo first released on the iOS platform in September 2016 , followed by the Android version on March 23 , 2017 . Mobile games have always proven to be attractive luresAttack.Phishingfor cybercriminals to get users to download their malicious apps and potentially unwanted apps ( PUAs ) . This is not the first time that the name of a popular game was abused ; we ’ ve discussed how the popularity of Pokémon Go was similarly abused . Based on feedback from the Smart Protection Network™ , we saw more than 400 of these apps in the first three months in 2017 alone . In the same time frame , we saw 34 fake apps explicitly namedAttack.Phishing“ Super Mario Run ” —it ’ s a noteworthy trend , as we saw the first of these only in December 2016 . In this post we ’ ll discuss the behavior of a new credit card stealing variant named “ Fobus ” ( detected as ANDROIDOS_FOBUS.OPSF ) . Cybercriminals frequently take advantage of popular and hotly anticipated titles to push their own malicious apps . These are usually distributed via third-party app stores . Some users may utilize such app stores to download “ unreleased ” versions of legitimate apps , or to obtain apps for free . These apps are illegitimate in the first place , and the risks to end users are quite high . We strongly advise that users download and install apps only from legitimate app stores such as Google Play or trusted third-party app store . In other cases , an attacker may even provideAttack.Phishinga fake app store that resemblesAttack.PhishingGoogle Play . Alternately , a message supposedly from a friend sentAttack.Phishingvia social media may lead to a malicious app . Disabling the “ Allow installation of apps from unknown sources ” setting prevents apps inadvertently downloaded these ways from being installed . By default , this setting is set to off . Only turn it on if you know you are installing an app from a trusted third-party app store . To carry out malicious behavior such as installing other apps on the user ’ s device without any user input and consent , or hiding icons and processes , an app needs device administrator privileges . Legitimate apps seldom require these ; users should double check whenever an app asks for them . This is particularly true of games , which do not require device administrator privileges . A “ game ” asking for these privileges is likely to be malicious or a PUA . Trend Micro solutions Users should only install apps from the Google Play or trusted third-party app stores and use mobile security solutions such as Trend Micro™ Mobile Security to block threats from app stores before they can be installed and cause damage your device or data . Enterprise users should consider a solution like Trend Micro™ Mobile Security for Enterprise . This includes device management , data protection , application management , compliance management , configuration provisioning , and other features so employers can balance privacy and security with the flexibility and added productivity of BYOD programs .
Security researchers from Neseso are sounding the alarm on a vulnerability they 've discoveredVulnerability-related.DiscoverVulnerabilityin Samsung smart TVs that Samsung declined to fixVulnerability-related.PatchVulnerability. The security flaw affectsVulnerability-related.DiscoverVulnerabilityWi-Fi Direct , a Wi-Fi standard that enables devices to connect with each other without requiring a wireless access point . Smasung uses Wi-Fi Direct with its smart TVs to allow TV owners to connect to the TV via their phones , laptops , or tablets , directly , and not through the local access point . Neseso researchers claimVulnerability-related.DiscoverVulnerabilitythat Samsung has failedVulnerability-related.DiscoverVulnerabilityin the implementation of this standard , as Samsung TVs only use MAC addresses to authenticate users . Other vendors use more solid authentication systems based on a Push-Button or PIN . Because anyone can sniff and spoof MAC addresses , this vulnerability opens the user 's TV to getting hacked by anyone in the range of the TV 's Wi-Fi Direct coverage . `` Once connected , the attacker has access to all the services provided by the TV , such as remote control service or DNLA screen mirroring , '' Neseso researchers wrote in their report . The dangers are palpable for companies , as most have smart TVs in their offices , employee lounges , customer waiting rooms , or board rooms . Worse is that the Samsung smart TV Wi-Fi Direct feature is enabled by default every time the device boots up . Users are notified on screen when a whitelisted device connects to the TV via Wi-Fi Direct , but those warnings could be misinterpreted by TV owners , or missed altogether if nobody 's watching the TV . Contacted by Neseso in mid-March , Samsung answered it does n't view this feature as a security risk and declined to provideVulnerability-related.PatchVulnerabilitya firmware update , telling Neseso they do n't view this issue as a `` security threat . '' Researchers tested their attack on Samsung UN32J5500 Firmware version 1480 , but say that other versions are most likely vulnerableVulnerability-related.DiscoverVulnerabilityas well . There is currently no workaround for protecting against attacks via Wi-Fi Direct except turning off the feature every time you boot/reboot your device . Earlier this month , at the Security Analyst Summit 2017 , security expert Amihai Neiderman disclosedVulnerability-related.DiscoverVulnerabilityabout the presence of 40 zero-day vulnerabilities in Tizen , the operating system that runs on Samsung smart TVs . The flaws were all unpatchedVulnerability-related.PatchVulnerabilityat the time they were reportedVulnerability-related.DiscoverVulnerability.