A recent report from Trustwave on the state of malware relays that online crime, unfortunately, does pay. The report, originally cited by Net Security, relays that attackers on average enjoy a 1,425% return on investment, with the average return checking in at $84,100 on an average initial investment of $5,900.
We might be entering a whole new era of malware, one where even those who lack any semblance of deep technical expertise will be able to acquire and disseminate viruses and the like on the fly.
Speaking to this point, security researchers at McAfee recently discovered a new piece of software which makes it exceedingly easy for anyone to create their own ransomware. The online software, which runs on TOR, is called Tox and, believe it or not, is completely free to use. The developers of the software aim to make money on the back end by taking a cut of any successful ransomware campaigns its users run.
Here’s how it all works.
Security researchers at Symantec recently discovered a new piece of malware that, believe it or not, incorporates a number of themes from the hit TV show Breaking Bad. The malware itself primarily affects users in Australia and represents a new strain of an existing ransomware trojan dubbed Trojan.Cryptolocker.S.
The ransomware, which only targets Windows machines, operates by encrypting all of a user’s files and subsequently demanding a timely payment of $450 Australian Dollars (about $355 in U.S. dollars) to decrypt them. Failure to promptly make the $450 payment results in the decryption fee rising to $1000 Australian Dollars.
Malware is never an easy subject for Android device owners. Savvy users usually say the matter is overblown and that they know how to protect themselves against such threats, though that’s not always the case. Google acknowledges the matter but usually minimizes it, though it’s also constantly coming up with better means for protecting the safety of users. Meanwhile millions of Android devices fall prey to malware, and most of the time users don’t even know what’s going on.
New research from Palo Alto Networks has brought to light a terrifying vulnerability in Android that could be used for secretly installing malware apps on a device on almost 50% of existing devices, Business Insider reports.
The dangers of mobile malware are very real, and we’re now reminded yet again how quickly these malicious programs can spread thanks to a new outbreak. Dubbed “Gazon,” this new malware has been called “one of the single largest messaging-initiated mobile malware outbreaks” by the experts who discovered it.
Luckily, Gazon is fairly easy to avoid if you know what you’re looking for, and we’ll tell you everything you need to know to protect yourself right here in this post. More →
Android’s malware problem might be overstated, but that doesn’t mean you shouldn’t be cautious when navigating the web on your device. On Wednesday, anti-virus software maker AVG reported that a newly discovered malware can continue to spy on you even after you think you’ve turned off your device. More →
Sony Pictures was hit by unknown hackers last week who managed to steal various sensitive information, including high-quality digital versions of several unreleased Sony movies, prompting the FBI to issue a five-page warning to certain U.S. businesses regarding a new type of “destructive” malware. A copy of the memo has been obtained by Reuters. More →
Security researchers have discovered a highly advanced malware program, called Regin, that have been used for spying purposes for at least six years. First discovered by Symantec and confirmed by Kaspersky, the security threat is believed to be the work of a government, considering the massive resources behind it and its sophisticated features, rather than a program devised by hacker groups interested in stealing data and/or money from regular Internet users. More →
If you thought hackers gaining access to just one of your online accounts was troublesome, you’ll be terrified to know that the next frontier might put your entire online identity at risk. IBM’s Security Intelligence reports that a new configuration of the Citadel trojan has been designed to start keylogging when specific password managers begin running on an infected user’s computer. More →