Of course, this was not limited to naming: the pandemic theme was also used in application user interfaces. Here are a few names of malicious files: ir., coronalocker.zip,, coronaalert.apk, corona.apk,, .1.1.apk, coronavirus.china. The mobile malware often hid behind another popular term, “corona”. These apps were placed on malicious websites, hyperlinks were distributed through spam, etc. Names we encountered included covid.apk, covidMapv8.1.7.apk, tousanticovid.apk, covidMappia_v1.0.3.apk and coviddetect.apk. ![]() The word “covid” in various combinations was typically used in the names of packages hiding spyware and banking Trojans, adware or Trojan droppers. It just so happened that the year 2020 gave hackers a large number of powerful news topics, with the COVID-19 pandemic as the biggest of these. Therefore, attackers constantly monitor the situation in the world, collecting the most interesting topics for potential victims, and then use these for infection or cheating users out of their money. All they need to do is correctly identify the application, or at least, the type of applications, that are currently in demand. In their campaigns to infect mobile devices, cybercriminals always resort to social engineering tools, the most common of these passing a malicious application off as another, popular and desirable one.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |