Mobile Banking Trojans Reach All-Time High
Mobile banking Trojans topped the list of cyber threats in the second quarter of the year, according to research by Kaspersky Lab
The number of installation packages for modifications for mobile banking Trojans peaked at more than 61,000 – an all-time high – in the second quarter of 2018, researchers at Kaspersky Lab have reported.
These modifications are aimed at helping cyber attackers avoid detection by security systems and to expand their arsenal.
The second-quarter peak is more three times greater than the previous quarter and more than double the number of installations recorded in the first quarter of 2017.
Mobile banking Trojans are designed to steal money directly from mobile users’ bank accounts. This type of attack is attractive to cyber criminals looking for an easy profit, researchers said.
The malware is typically disguised as a legitimate banking app to lure people into installing it. Once the app is launched, the Trojan displays its own interface, which is designed to steal any credentials entered.
In the second quarter, the greatest contribution to the number of Trojans was made by the creators of Trojan Hqwar, with about half of the new modifications discovered relating to this malware, followed by Trojan Agent with about 5,000 packages.
The top three countries with the biggest share of people targeted by mobile banking malware as a proportion of all mobile malware were the US (0.79%), Russia (0.7%) and Poland (0.28%).
According to Kaspersky Lab researchers, the explosion in the number of banking Trojans could be part of a global trend for mobile malware growth, as the overall number of mobile malware installation packages also rose, by more than 421,000 compared with the previous quarter.
“There is a great cause for concern regarding mobile security, judging by our evaluation of the threat landscape in the second quarter of this year,” said David Emm, principal security researcher at Kaspersky Lab.
“Cyber criminals are constantly creating new modifications to their malicious software to make it more sophisticated and discreet – and thus harder for cyber security firms to detect.”
According to Emm, this is yet another wake-up call for the industry. “Consumers should be vigilant and extremely cautious, especially in the coming months, as the trend continues to grow,” he said.
Attempted infections by malware that aims to steal money via online access to bank accounts were registered on 215,762 user computers in the second quarter, up more than 5% on the previous quarter.
- Google Cloud Data Engineer
- Up to £90,000 Base
Google Cloud Data Engineer London Salary: Up to £90,000 Base We are currently working with a leading Google Cloud partner who are currently looking for a Google Cloud Data Engineer in London. The Google Cloud Data Engineer will be responsible for projects designing and implementing data cataloguing platforms using Google Cloud. Current Experience Required: Google Cloud (MUST be Google Cloud Professional Engineer Certified and worked on recent GCP/Google Cloud Projects). Data Analytics (Data Engineering, Data Mining, Data Cataloguing etc.) Cloud PUB / SUB Candidates must be UK based and commutable to London. Candidates outside of the EU can not be sponsored Apply for more information or call Peter Georgiou on 02086634030. Ref: PG7692
- Microsoft Azure Sales Consultant
- Up to £100,000 Base + OTE
DCL are currently working on behalf one of the fastest growing service providers in London who are on the lookout for a consultative Microsoft Azure Sales Consultant. The Microsoft Azure Sales Consultant will be responsible for selling (opening and closing new business opportunities new business) and being the SME in all things Cloud providing support to other members in the sales team. Preference will be given to the Microsoft Azure Sales Consultant who possesses Exceptional knowledge of Cloud Technology (Public / Private / Hybrid.). Current experience with technology such as Azure, AWS, Office 365 is required Proven sales experience of identifying and closing new business within the Cloud market. Must be currently selling into the enterprise market. Consistency on tenure in current and past roles. New business background is a must In return you will be working for a successful, growing SME organisation with excellent training and sales support from pre-sales, post-sales, project management, service management, bid management, pricing and customer service. Candidates must be UK Based. sponsorship can not be provided for this role. Reference Number: BD7690 (Cloud Sales Jobs, Cloud Computing Jobs, Cloud Computing Sales)
- Senior Incident Cyber Response Consultant
- Up to £75,000 Base
Senior Incident Cyber Response Consultant with Forensic experience is needed to join a global consultancy whose cyber business unit are continuing to their investment in the growth of their team. From my perspective, as a recruitment partner, this is a particularly interesting and exciting opportunity. Not only is the team in an active growth mode, but they have varied, high profile and interesting projects for their team. Globally recognised. This is an opportunity to drive and grow a career. Experienced Senior Incident Cyber Response Consultant is needed to help take clients through the complete IR / triage process. The position is be client facing and will be expected to engage with clients at a commercial level. Proactive IR planning is also key to the position. The Senior Incident Cyber Response Consultant will not hold a sales target, but any previous experience in identifying and generating revenue is highly sort after. A broad forensic background would be highly desirable also. An ideal Senior Incident Cyber Response Consultant will be CREST CCIR, CCIM certified. Experience with forensics is highly desirable. Any of the following are very desirable also CREST Certified Network Intrusion Analyst (CCNIA) CREST Certified Host Intrusion Analyst (CCHIA) CREST Certified Malware Reverse Engineer (CCMRE) CREST Practitioner Intrusion Analyst (CPIA) An individual must be London commutable Key attributes should also include; stakeholder engagement, mentoring of team members, a collaborative working style. Technical experience must include; demonstrable experience within cyber incident response, Forensic, cyber etc. Additional certifications could / should include GIAC certified (Intrusion analyst, incident handler, forensic handler) The opportunity for an individual to conduct malware research and analysis is actively promoted. Career development and the opportunity to influence, apply today for more information or call Chris Holt on 07884666351 or 02086634030 or email firstname.lastname@example.org Unfortunately, our client are unable to provide sponsorship for this opportunity. Candidates must be UK based. Ref: CH7679 (Incident Response Jobs, CREST Jobs, Digital Forensics Jobs, IR Jobs)
- Principal Electrical Engineer
- Salary: Up to £90,000 Base + Bonus
Principal Electrical Engineer Location: London Salary: Up to £90,000 Base + Bonus A Principal Electrical Engineer is needed for a state of the art, London based Data Centre provider. The Principal Electrical Engineer will be responsible for all of the Mechanical & Electrical components (support, development/design etc.) within our clients Data Centre’s. Other responsibilities include but not limited to; Commissioning, approving, design & review/improvement of new data centre infrastructure Commercial’s (Contract negotiation, project finances etc.) Project management Training/Development of other staff General engineering tasks Requirements HND / Degree in Engineering or equivalent. Must have current/recent experience (ideally in a senior position) within a mechanical & electrical position within a Data Centre environment Candidates must be UK based and unfortunately, our client are unable to provide sponsorship Ref: PG7600 (M&E Jobs, Mechanical & Electrical Jobs, Engineering Jobs, Data Centre Jobs, Data Center Jobs)