ANDROID BANKING MALWARE: SOPHISTICATED TROJANS VS. FAKE BANKING APPS

January 17, 2019

In this white paper, we will provide insight into the two most prevalent types of Android banking malware to date – sophisticated banking Trojans and fake banking apps – and compare their different approaches to achieving the same malicious goal. At the same time, we will explore the impact of those approaches on potential victims. Having identified the tactics of both categories, we will provide advice for users on how to stay safe from Android banking malware.

Spotlight

xandora.net

Xandora.net is a tool for analyzing the behavior of Windows PE-executables with a special focus on the analysis of malware. Xandora provides a detailed report that contains enough information to give a security analyst or researcher what they need to know about the purpose and the actions of the analyzed binary. The generated report includes detailed data about modifications made to the Windows registry or the file system or other processes and of course it logs all generated network traffic. The analysis is based on running the binary in an emulated environment and watching. Xandora scores each analyzed file with an X-Score that indicates the degree of maliciousness. The results from Virustotal are also provided in the report to quickly identify if the file is known and AV signatures already available.

OTHER WHITEPAPERS
news image

The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | December 15, 2019

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

Cyber Risk Appetite: Defining and Understanding Risk in the Modern Enterprise

whitePaper | January 16, 2020

Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise. In fact, cyber security is now increasingly reviewed by corporate boards of directors and often discussed with financial analysts who see cyber security risk as an imminent and paramount business risk. Because the consequences of cyber security failures can be damaging to business revenues and brand reputation, CEOs have lost their positions as a result of data breaches and inept preparation and planning.

Read More
news image

Check The Locks

whitePaper | October 4, 2022

Organizations have invested millions towards improved information security since the start of the pandemic, which galvanized a worldwide explosion of cybercrime. C-suites are increasingly recognizing cybersecurity as a business risk, viewing its necessity as more than just an IT problem.

Read More
news image

Security Pillar AWS Well-Architected Framework

whitePaper | October 18, 2022

Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon.

Read More
news image

2022 Cybersecurity Predictions

whitePaper | June 27, 2022

At the end of every year, our experts put their heads together to anticipate and prepare for what’s to come next in the world of cybersecurity. We retrospect on the months past, and analyze impactful developments, breaches, and tactics. We package the outputs of this process for IT leaders, so they, too, can anticipate and prepare.

Read More
news image

Post-Covid-19: Digital Transformation and OT Cyber Security in Asia

whitePaper | November 2, 2022

Digital transformation has been dramatically accelerated by the Covid-19 pandemic, requiring businesses and operations to quickly set up infrastructures to maintain business continuity. And no part of the network has been impacted more than the OT environment. New systems allow employees to operate from home and for equipment vendors to connect remotely to the network to maintain production. And as we emerge from the pandemic, organisations are now more cognisant of the advantages of scaling their business and operations beyond their traditional network perimeters than ever before.

Read More

Spotlight

xandora.net

Xandora.net is a tool for analyzing the behavior of Windows PE-executables with a special focus on the analysis of malware. Xandora provides a detailed report that contains enough information to give a security analyst or researcher what they need to know about the purpose and the actions of the analyzed binary. The generated report includes detailed data about modifications made to the Windows registry or the file system or other processes and of course it logs all generated network traffic. The analysis is based on running the binary in an emulated environment and watching. Xandora scores each analyzed file with an X-Score that indicates the degree of maliciousness. The results from Virustotal are also provided in the report to quickly identify if the file is known and AV signatures already available.

Events