Read Time:1 Minute, 45 Second

Threat actors continuously adapt and improve their malicious attempts despite innovations in cybersecurity. 

In today’s world, there are trojans built explicitly for the Android operating system and are specially-crafted programs designed to look like legitimate programs.

Romanian cybersecurity technology company Bitdefender identified the top trojans targeting Android and published its findings in its August Bitdefender Threat Debrief (BDTD). The BDTD is a monthly series that provides insights into threat news, trends and research from the previous month.

On the top of the list is Downloader. DN. These trojans are repacked applications from the Google Playstore App and include aggressive adware. The adware would then allow the download of malware.

Second on the list is SMSSend.AYE is malware that attempts to register as the default SMS app by requesting the consumer’s consent. Once achieved, it collects incoming and outgoing messages and forwards them to a Command & Control (C&C) server.

Triada.LC is malware that gathers device information like device and subscriber IDs and MAC addresses and sends it to a malicious C&C server, which would respond by sending a link to a payload that the malware downloads.

Banker.ZX is another trojan identified in the report. Threat detectors develop applications that pose as legitimate banking apps that can also imitate conversations with customer support. Like other trojans, it asks for permissions to access contacts, microphone, geolocation and camera.

The BDTD also included the top 205 ransomware families identified where WannaCry gained the most detections at 37%, followed by Robin at 20% and GandCrab at 11%.

The report also includes the countries most impacted by ransomware. Though ransomware was detected in 151 countries in the company’s dataset, most attacks were detected in the United States, Brazil, India, Iran and Germany.

In addition, Bitdefender uncovered that most ransomware attacks are still opportunistic. The company also released research about a new Google Play campaign that bypasses security checks allowing the delivery of potentially malicious content and advertisements. It discovered that 35 apps on the Google Play Store utilised techniques to avoid storefront security checks.

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
APAC Partnership With Claroty Previous post Exclusive Networks Finalises APAC Partnership With Claroty
cybersecurity Next post Malicious Actors Find Australia an ‘Attractive Target’