Researchers Discover Android Variant of Dreaded iOS Spyware Pegasus

| April 4, 2017

article image
The infamous Pegasus malware, a strain of spyware that is known to target iOS devices now has a cousin in Chrysaor, an Android variant that can steal and compromise the world’s most widely used mobile operating system.

Spotlight

Communication Valley Reply

Communication Valley Reply is the Reply Group company that specialises in providing managed security services. Through its Cyber Security Operation Center – an ISO27001-certified European centre of expertise in the managed security services sector that operates on a 24/7 basis, 365 days per year – the company ensures business continuity and fraud prevention for companies with regard to threat intelligence, fraud detection and management, security monitoring and testing, and managed network security. With more than 15 years of experience, Communication Valley Reply provides specialised services for the finance sector in the identification and analysis of malware, in the detection of websites created for conducting special phishing campaigns, and in the analysis of fraudulent, often highly complex transactions, including forensic analyses.

OTHER ARTICLES

Work From Home: Cyber Security During Covid-19

Article | April 14, 2020

COVID-19 has significantly affected individuals and organizations globally. Till this time more than 1.7 million people in 210 countries have bore the brunt of this mysterious virus. While this crisis is unparalleled to the past crises that have shaken the world and had lasting impacts on different businesses, economies and societies but the one domain that had remained resilient through all the past crises and is going solid in COVID-19 as well is Cyber security. While most of the sectors globally have been affected, Cybersecurity’s importance to organizations, consumers and home users have not only remained strong but have been increased drastically.

Read More

Authentication and Passwords Concerns Top New Ponemon Institute Report

Article | February 20, 2020

IT security practitioners are aware of good habits when it comes to strong authentication and password management, yet often fail to implement them due to poor usability or inconvenience, says the 2020 State of Password and Authentication Security Behaviors Report by Yubico and Ponemon Institute. According to the report,IT security practitioners and individuals are both engaging in risky password and authentication practices, yet expectation and reality are often misaligned when it comes to the implementation of usable and desirable security solutions. The tools and processes that organizations put in place are not widely adopted by employees or customers, making it abundantly clear that new technologies are needed for enterprises and individuals to reach a safer future together.

Read More

How Is Covid-19 Creating Data Breaches?

Article | March 30, 2020

Trevor is working from home for the first time. He loves the freedom and flexibility, but doesn’t read his company’s new BYOD policy. Sadly, he misses the fact that his home PC is not protected with updated security software nor the latest operating system patches. Kelcie’s home PC is faster than the old work laptop that she’s been issued to use during the pandemic. She decides to use a USB stick to transfer large files back and forth between her PCs to speed things up. After a few days, she does all her work on her home PC, using a “safe” virtual desktop app. But unbeknownst to her, there is a keylogger on her home PC.

Read More

Ryuk: Defending Against This Increasingly Busy Ransomware Family

Article | February 12, 2020

On December 16, 2019, the U.S. Coast Guard disclosed a security incident at a facility regulated by the Maritime Transportation Security Act (MTSA). Forensic analysis suggests that the incident might have begun when an employee clicked on a link embedded in a phishing email.This action enabled a threat actor to set Ryuk ransomware loose on the facility’s network. Ultimately, the infection spread to all IT network files, leading Ryuk to disrupt the corporate IT network and prevent critical process control monitoring systems from functioning properly. Phishing is one of the primary infection vectors for most ransomware families, but there’s an interesting twist with this particular family. As noted by Malwarebytes, a typical Ryuk attack begins when a user opens a weaponized Microsoft Office document attached to a phishing email. Opening the document causes a malicious macro to execute a PowerShell command that attempts to download the banking trojan Emotet. This has the ability to download additional malware onto an infected machine that retrieves and executes Trickbot.

Read More

Spotlight

Communication Valley Reply

Communication Valley Reply is the Reply Group company that specialises in providing managed security services. Through its Cyber Security Operation Center – an ISO27001-certified European centre of expertise in the managed security services sector that operates on a 24/7 basis, 365 days per year – the company ensures business continuity and fraud prevention for companies with regard to threat intelligence, fraud detection and management, security monitoring and testing, and managed network security. With more than 15 years of experience, Communication Valley Reply provides specialised services for the finance sector in the identification and analysis of malware, in the detection of websites created for conducting special phishing campaigns, and in the analysis of fraudulent, often highly complex transactions, including forensic analyses.

Events