By Song Wang (Mobile Threat Analyst) At the start of the year, Google updated its permission requests in Android applications, and in particular, restricted access to SMS and CALL Log…
Browsing CategorySocial
How a Hacking Group is Stealing Popular Instagram Profiles
by Jindrich Karasek and Cedric Pernet (Threat Researchers) Social media influencers build and expand their business or brand through credibility and authenticity to their audience. For hackers, however, they could…
New Magecart Attack Delivered Through Compromised Advertising Supply Chain
by Chaoying Liu and Joseph C. Chen On January 1, we detected a significant increase in activity from one of the web skimmer groups we’ve been tracking. During this time,…
Cybercriminals Use Malicious Memes that Communicate with Malware
By Muhammad Bohio Steganography, or the method used to conceal a malicious payload inside an image to evade security solutions, has long been used by cybercriminals to spread malware and…
FakeSpy Android Information-Stealing Malware Targets Japanese and Korean-Speaking Users
Spoofing legitimate mobile applications is a common cybercriminal modus that banks on their popularity and relies on their users’ trust to steal information or deliver payloads. Cybercriminals typically use third-party…