Security Alerts & News
by Tymoteusz A. Góral

History
#881 Marcher mobile bot adds UK targets, steps up banking fraud capabilities
According to X-Force intelligence, Marcher first appeared in the wild in late 2013. It is known to be a commercial offering sold in Russian-speaking underground forums by its supposed developer or distribution accomplices.

In the first year of its activity, Marcher did not target banks; initially, it was only used by its various operators to steal credit card information from infected victims. To do so, a phishing overlay screen was triggered when users accessed the Google Play app store, plastering a fake window on top of the app store’s activity to request users’ credit card number, expiration date and CVV2 code. In 2014, Marcher began targeting banks, starting with a large bank in Germany, PhishLabs reported.
Read more
#887 Updated CryptXXX ransomware big money potential
#886 NTP patches flaws that enable DDoS
#885 WordPress patches 0-day in WP Mobile Detector plugin
#884 Does your website suck on mobile? Find out using Google's free new tool
#883 Ransomware as a service, inside an organized Russian ransomware campaign (PDF)
#882 FastPOS: Quick and easy credit card theft
#881 Marcher mobile bot adds UK targets, steps up banking fraud capabilities
#880 IRONGATE ICS malware: Nothing to see here... masking malicious activity on SCADA systems
#879 Stop Facebook tracking you across the web, change these settings
#878 Facebook’s new DeepText AI understands almost everything we write
#877 Hacked TeamViewer users 'careless' in personal security
#876 FireEye: Organisations should stop playing malware whack-a-mole
#875 ​Former cyber defence head: Ethics should be at the core of cybersecurity
#874 Dropbox smeared in week of megabreaches
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12