Data Security News Headlines 9th June 2017

  1. Hacked! Mumbai man loses Rs 84,000 within 9 swipes in 5 nations

Online banking fraud has been steeply increasing in India. According to a latest report Mr. Bikash Kumar has fallen prey to this method of fraud. He has reportedly lost Rs 84,000 within 9 swipes which was surprisingly around 5 different nations. On Wednesday, Kumar was having a peaceful night when he received a message with a One-Time Password (OTP) for a transaction on his SBI credit card. When he checked his email, he found that nine transactions had been made at various international websites in various currencies, which cost him approximately around R84, 000 in a single minute. He said that he had never shared his banking details with anyone nor his OTP. Cyber cell team have started investigating the issue.

Cyber Security Tips: To prevent from such banking fraud you are recommended to keep your banking data secure, use a strong password and never share your banking details with anyone.

  1. Android-Rooting Trojan With Code Injection Ability

A recent report brings forward that Security Researchers at Kaspersky Lab discovered a new piece of Android rooting malware that was being distributed as gaming apps on the Google Play Store, hiding behind puzzle game “colourblock”. The researcher explained that Dvmap, the Android rooting malware disables security settings of a device to install another malicious app from a third-party source and also injects malicious code into the device system runtime libraries to gain root access and stay persistent. Dvmap is Trojan which works on both 32-bit and 64-bit versions of Android. Once these malware is installed, it attempts to gain root access on the device and tries to install several modules on the system including a few written in Chinese language, along with a malicious app called “com.qualcmm.timeservices.” It also takes control over android devices.

Cyber Security Tips: Users who have already installed puzzle game are recommended to back up your data and perform a full factory data reset in an effort to mitigate the malware. Always verify app permissions before installing and check app permission of installed apps.

  1. Hackers are using popular chat apps to control malware operation

A group of IT security researchers have revealed that Russian hackers are controlling malware operation through popular chat apps. According to a research conducted by Trend Micro, it was revealed that hackers could use third-party chat applications such as Slack, Discord, and Telegram as command-&-control (C&C) centers to host malware on a victim’s system. The security researchers at Trend Micro discovered that (PDF) APIs of these platforms could be exploited to serve as C&C centers for different types of malware.

Cyber Security Tips: Users are recommended to keep monitoring for any changes to their data, keep using malware protection and an updated antivirus.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Blog at WordPress.com.

Up ↑

%d bloggers like this: