Data Security News Headlines 14th December, 2016

  1. More Firmware Backdoor Found In Cheap Android Phones

According to research low-cost Android smartphones and tablets are vulnerable with malicious firmware, which covertly gathers data about the infected devices, displays advertisements on top of running applications and downloads unwanted APK files on the victim’s devices. Security researcher Dr. Web have discovered two types of downloader Trojans that have been incorporated in the firmware, which are operating on the MediaTek platform, which are mostly marketed in Russia. The Trojan are Android.DownLoader.473.origin and Android.Sprovider.7, are capable of collecting user data, installed app, also able to update and install malicious apps, automatically opening link in browser, making phone calls, showing advertisement, create shortcut and other hand Android.DownLoader.473.origin found in the remaining devices, which downloads and installs other malware programs and unwanted apps, including an advertising program called H5GameCenter. According to report the affected devices includes Lenovo A319, Lenovo A6000, MegaFon Login 4 LTE, Bravis NB85, Bravis NB105, Irbis TZ85, Irbis TX97, Irbis TZ43, Irbis tz56, Pixus Touch 7.85 3G, SUPRA M72KG, SUPRA M729G, SUPRA V2N10, Itell K3300, Digma Plane 9.7 3G, General Satellite GS700, Nomi C07000, Optima 10.1 3G TT1040MG, Marshal ME-711, 7 MID, Explay Imperium 8, Perfeo 9032_3G, Prestigio MultiPad Wize 3021 3G, Prestigio MultiPad PMT5001 3G, Ritmix RMD-1121, Oysters T72HM 3G, Irbis tz70, and Jeka JK103.

Cyber Security Tips: If you own device from list then you have secure your device with updated antivirus, keep backup of your data, avoid to click on advertise, check app permission before installation and install app only from trusted sources.

  1. Malicious Cryptocurrency Mining tool turns Computers into Zcash Mining Machines

Zcash (ZEC) is a new cryptocurrency Launched in late October that claims to be more anonymous than Bitcoin, as the sender, recipient and value of transactions can be hidden. According to report cyber criminals have already started deploying malware that installs on and infects the computers of unsuspecting users and then uses their resources to mine Zcash for the hacker’s profit and hackers are distributing malicious software via links for things like pirated software, forcing unwilling users’ computers to mine Zcash without their knowledge. Once installed, the malware forces a victim’s computer to mine Zcash and transfers the funds to the attacker. According to report cryptocurrency mining operation is power hungry, the computer uses up a lot more electricity that could end you up paying a hefty electricity bill. So, if you have noticed your recent electricity bill to be unexpectedly excessive, chances are a Zcash cryptocurrency miner is running in the background, it also consume 90 %RAM and your system is restarting frequently.

Cyber security Tips: To prevent from such hack, check programs running in background, use updated antivirus and keep monitoring your account.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Blog at WordPress.com.

Up ↑

%d bloggers like this: