A Mobile Overlay attack is a widespread attack on Android mobile devices whose goal is to intercept credentials for accessing a target application via a Trojan about popular online services (retail, payment, and banking).
Exodus is one of the latest spyware’s disguised and distributed through the Google Play Store.
Thanks to all who stopped by at the booth and met us. Weren’t you at RSA Conference? Here's the opportunity to download our company overview with the main topics addressed during the event.
This document describes the evolution and trends in Android malware behaviour with a focus on the financial context. After an initial contextualisation and an explanation of the usual anatomy of a mobile malware attack, the current landscape is presented with some interesting statistics. In conclusion, the MORE® malware engine is introduced explaining the benefits of [...]
As widely known, the Android operating system is based on Linux. Even if it has been subjected to a heavy customisation to improve it in terms of performance and security on mobile/embedded devices, it still preserves a lot of interesting concepts and components of its parent, one of them is the “everything is a file” [...]
iOS - Extended supported username max length from 32 to 128 characters; - General optimisation; - Minor fixes and improvements. Android - Extended ABI support to armeabi-v7a and arm64-v8a; - Optimised Malware Engine network data transmission; - Extended security checks surface; - Minor fixes and improvements.
Thanks to our Security Analysts CVE-2017-13165 was acknowledged to XTN.
Android malware is on the rise along with the popularity of Android OS. Malware writers are using novel techniques to create malicious Android applications which severely undermine the capability of traditional malware detectors which are ineffective towards detecting these unknown malicious applications. One of the last malware discovered, dubbed Expensive Wall, has infected about 21 [...]
What happens when a malware code is sold on underground board by black-hat vendors to fraudsters buyers? A source code leaked and a massive attack happened. This is what happened in December 2015, when the source code for the Android malware GM Bot, developed to perpetrate mobile banking frauds, was leaked by buyers and sold for free [...]