Posts tagged: trojan

Is Your Apple Device Safe from Malware Infection?

Apple customers, particularly Mac users, are normally adamant about the fact that their computers don’t need protection from viruses, Trojans, Ransomware, or other threats that impact Windows PCs on a day-in-and-day-out basis.  Is it true, or a myth?  The truth is that while the general threat level is far lower on a Mac than a PC, the OS-X operating system is not immune.

Apple has been a target of lesser opportunity only because criminals invest their time, money and resources where the return will be greatest.  That has historically targeted PCs almost exclusively, due to their market share.  As the installed base of Macs continues to grow, so does the appearance of threats.  How quickly?

A recent blog post on the Official Security Blog site of Malwarebytes states: “The popularity of Macs leads to more cybercriminals wanting to write malicious code for OS X. Although still much lower than PCs, the number of threats targeting Apple operating systems has grown steadily, with a spike in Mac infections observed over the last 18 months. A recent study by Bit9 + Carbon Black found that the number of Mac OS X malware samples detected in 2015 was five times greater than in the previous five years combined.”

If you are not deploying security software on your Apple device, now would be the time to do so.  Don’t wait to be a victim of something like the Ransomware  KeRanger , which was  downloaded  by  around  6,500  people  within  the 12-hour  period  that  it  was  available.  Some  of  those  users  had  their  data  completely  destroyed.

Ransomware (malware) on Cell Phones

 

ransomeWe thought that our cell phones were safe from ransomware, like CryptoLocker, which has been infecting hundreds of thousands of computers in the U.S.  Not so!  A recent article in CNet Daily News reports that there are as many as 5,000 attacks per day.  A mobile threat report from Mobile Lookout Security, which makes security software for smartphones, found 4 million of Lookout’s 60 million users were held hostage last year.  In 2014 they report a 75% increase in mobile threats in the U.S.  You can read about the most prevalent malware at the end of the post, below.

The article tells the story of  a 12-year-old girl from Tennessee who tapped a link on her smartphone to watch a new music video.  Instead of a video, she had unwittingly installed malicious software that downloaded child pornography, locked her Android phone, and threatened to report the pornography to the FBI if she didn’t fork over $500 in ransom.

What should you do to protect yourself?

1)  Never download applications from outside the official Google Play store or Apple App Store.  Be careful clicking on links when online.  “Free” could wind up being very expensive.  Keep that in mind when on social media sites.

2)  Install an application that will block ransomware.  Avast (free for mobile) and Mobile Lookout Security are two big players.  Note item #1 above before downloading software which will allegedly protect you, from an unknown source.

3)  Never pay the ransom, and always report the crime to police.  There is no track record to show that paying ransom will lead to removal of the malware and release of your mobile device. In most cases, you are only providing incentive for thieves to continue to create new and more sophisticated software.

It’s an even more dangerous computing world out there than it was just a year ago.  Be extra careful out there!!

The most prevalent ransomware threats in 2014, according to Mobile Lookout Security:

  1. NotCompatible| Malware

​NotCompatible is a trojan that surreptitiously acts as a network proxy.  It allows attackers to send and receive traffic through a victim’s mobile device onto connected networks for fraudulent purposes.

  1. Koler| Malware

Koler is a trojan disguised as a media app.  It locks a victim’s device, after falsely reporting the discovery of illegal activity.  Koler attempts to coerce victims into paying them to avoid criminal charges and regain control of their device.  The CNet article advises that police can tell that you are not the “guilty party” so don’t be afraid to report.

  1. ScareMeNot| Malware

ScareMeNot is a trojan that pretends to scan victims’ phones for security issues.  It then locks their device, after falsely reporting that its scan found illicit content. It attempts to coerce victims into paying them to avoid criminal charges and regain control of their device.  Again, report this to police.

  1. ColdBrother| Malware

ColdBrother is a trojan that pretends to scan victims’ phones for security issues, but then locks their device after falsely reporting that its scan found illicit content. It can also take a front-facing camera photo and attempts to coerce victims into paying them to avoid criminal charges and regain control of their device.

  1. ScarePakage| Malware

ScarePakage is a trojan that pretends to scan victims’ phones for security issues and then locks their device after falsely reporting that its scan found illicit content. ScarePakage attempts to coerce victims into paying them to avoid criminal charges and regain control of their device.

Notice that each of these Trojans are very similar.  It’s rumored that there is one very talented programmer who is being well paid by various criminal organizations to keep creating variations of the malware, in order to stay ahead of detection software.  Notice that each are “socially engineered” to make you want to run the software voluntarily.  So even if you don’t click on a malicious link out of ignorance, you can still fall victim.

WordPress Themes