Mobile Banking Trojans Reach All-Time High
Mobile banking Trojans topped the list of cyber threats in the second quarter of the year, according to research by Kaspersky Lab
The number of installation packages for modifications for mobile banking Trojans peaked at more than 61,000 – an all-time high – in the second quarter of 2018, researchers at Kaspersky Lab have reported.
These modifications are aimed at helping cyber attackers avoid detection by security systems and to expand their arsenal.
The second-quarter peak is more three times greater than the previous quarter and more than double the number of installations recorded in the first quarter of 2017.
Mobile banking Trojans are designed to steal money directly from mobile users’ bank accounts. This type of attack is attractive to cyber criminals looking for an easy profit, researchers said.
The malware is typically disguised as a legitimate banking app to lure people into installing it. Once the app is launched, the Trojan displays its own interface, which is designed to steal any credentials entered.
In the second quarter, the greatest contribution to the number of Trojans was made by the creators of Trojan Hqwar, with about half of the new modifications discovered relating to this malware, followed by Trojan Agent with about 5,000 packages.
The top three countries with the biggest share of people targeted by mobile banking malware as a proportion of all mobile malware were the US (0.79%), Russia (0.7%) and Poland (0.28%).
According to Kaspersky Lab researchers, the explosion in the number of banking Trojans could be part of a global trend for mobile malware growth, as the overall number of mobile malware installation packages also rose, by more than 421,000 compared with the previous quarter.
“There is a great cause for concern regarding mobile security, judging by our evaluation of the threat landscape in the second quarter of this year,” said David Emm, principal security researcher at Kaspersky Lab.
“Cyber criminals are constantly creating new modifications to their malicious software to make it more sophisticated and discreet – and thus harder for cyber security firms to detect.”
According to Emm, this is yet another wake-up call for the industry. “Consumers should be vigilant and extremely cautious, especially in the coming months, as the trend continues to grow,” he said.
Attempted infections by malware that aims to steal money via online access to bank accounts were registered on 215,762 user computers in the second quarter, up more than 5% on the previous quarter.
- Cyber Incident Response Consultant, Italy
- Up to €60,000
Cyber Incident Response Consultant, Italy Up to €60,000 Cyber Incident Response Consultant is needed to join a global consultancy whose cyber business unit are continuing to their investment in the growth of their team. The Cyber Incident Response Consultant role is client facing that will join an award-winning team that deliver varied, interesting and often challenging work to a wide range of prestigious clients. The Cyber Incident Response Consultant MUST have current experience taking a client through the complete IR / triage process and have a blend of both technical and commercial (identifying and developing new business opportunities within a client) Proactive Incident response, forensics and eDiscovery experience is a MUST. The Cyber Incident Response Consultant must be happy to travel. Key attributes should also include; stakeholder engagement, mentoring of team members, a collaborative working style. Technical experience must include; demonstrable experience within an cyber incident response, Forensic, cyber etc. Additional certifications could / should include GIAC certified (Intrusion analyst, incident handler, forensic handler) Any of the following are very desirable also CREST Certified Network Intrusion Analyst (CCNIA) CREST Certified Host Intrusion Analyst (CCHIA) CREST Certified Malware Reverse Engineer (CCMRE) CREST Practitioner Intrusion Analyst (CPIA) Career development and the opportunity to influence, apply today for more information.
- Data Consultant
- Up to £90,000 Base
Data Consultant Location: London Salary: Up to £90,000 basic DD7692 A leading Google Cloud Platform (GCP) Provider who is looking for a Data Consultant, based in London. Experience with GCP or other similar platforms (AWS, AZURE etc), experience with GCP technologies as well as experience with Machine Learning, Data Mining and Data Analytics. The Data Consultant will be responsible for design solutions for customers and providing technical knowledge in customer meetings. Ideally, the Data Consultant will have experience transforming the way companies work by building company-centric solutions on the Google Cloud Platform or similar cloud platforms. Our client is a Premier Google Cloud Partner, offering an exciting opportunity to work with innovative technology whilst giving you the chance to grow and develop your career. You will have the opportunity to benefit from a number of training courses at several Google locations.
- Senior Delivery Consultant Emerging Technologies
Senior Delivery Consultant Emerging Technologies The Senior Delivery Consultant will work on pure retained executive search mandates in the emerging technology sector. The Senior Delivery Consultant will work closely with the practice lead to complete research and deliver the assignment to completion. This is a senior role with both client and candidate contact, although you will not have a fee generation target. A generous commission structure will exist linked to the successful delivery of assignments. Come and work for a business where the client is retained and you can focus 100% of your time and efforts headhunting the best talent out there in the market! Ref: AMSDC Salary: Dependant on Experience Location: Beckenham
- SOC Manager / Threat Hunting Service Lead, Cyber
- £85,000 +
REFCH7713 SOC Manager / Threat Hunting Service Lead, Cyber £85,000 + Bracknell SOC Manager / Threat Hunting service Lead needed- must be commutable to the Reading / Bracknell area. We are looking for a SOC Manager / Threat Hunting Service Lead to aid in building out a new SOC / Threat hunting (IR) service offering. An in-depth technical background is essential, experience across SOC SIEM/ Threat Hunting (IR) tools, processes, techniques, operational is a MUST. The role will include, but not limited to; Establishing the technical process, building operational capability, managing and hiring team, creation of policy/playbooks, fine turning of the go-to-market collateral etc. Apply today for more information or contact me directly on Chris.Holt@dclsearch.com or 07884666351 Cyber Security Jobs, Information Security Jobs, SOC Manager Jobs, SOC Jobs