Mobile Banking Trojans Reach All-Time High
Mobile banking Trojans topped the list of cyber threats in the second quarter of the year, according to research by Kaspersky Lab
The number of installation packages for modifications for mobile banking Trojans peaked at more than 61,000 – an all-time high – in the second quarter of 2018, researchers at Kaspersky Lab have reported.
These modifications are aimed at helping cyber attackers avoid detection by security systems and to expand their arsenal.
The second-quarter peak is more three times greater than the previous quarter and more than double the number of installations recorded in the first quarter of 2017.
Mobile banking Trojans are designed to steal money directly from mobile users’ bank accounts. This type of attack is attractive to cyber criminals looking for an easy profit, researchers said.
The malware is typically disguised as a legitimate banking app to lure people into installing it. Once the app is launched, the Trojan displays its own interface, which is designed to steal any credentials entered.
In the second quarter, the greatest contribution to the number of Trojans was made by the creators of Trojan Hqwar, with about half of the new modifications discovered relating to this malware, followed by Trojan Agent with about 5,000 packages.
The top three countries with the biggest share of people targeted by mobile banking malware as a proportion of all mobile malware were the US (0.79%), Russia (0.7%) and Poland (0.28%).
According to Kaspersky Lab researchers, the explosion in the number of banking Trojans could be part of a global trend for mobile malware growth, as the overall number of mobile malware installation packages also rose, by more than 421,000 compared with the previous quarter.
“There is a great cause for concern regarding mobile security, judging by our evaluation of the threat landscape in the second quarter of this year,” said David Emm, principal security researcher at Kaspersky Lab.
“Cyber criminals are constantly creating new modifications to their malicious software to make it more sophisticated and discreet – and thus harder for cyber security firms to detect.”
According to Emm, this is yet another wake-up call for the industry. “Consumers should be vigilant and extremely cautious, especially in the coming months, as the trend continues to grow,” he said.
Attempted infections by malware that aims to steal money via online access to bank accounts were registered on 215,762 user computers in the second quarter, up more than 5% on the previous quarter.
- SailPoint File Access Manager Consultant/ Architect
- discussed on applications
SailPoint File Access Manager (SailPoint FAM) Consultant/ Architect is required for an up coming projects, Ideally looking for someone with experience in Designing and deploying SailPoint FAM , this is a new Deployment, you will work with customer in the initial workshop phase, to understand requirements and to get the initial design, you will then be responsible for deploying the solution. This is a home based role, with some onsite visits required during the length of the project. We are looking for someone who has previous experience in Deploying SailPoint FAM (ideally done design work) Need to have experience with SharePoint and ideally Azure and Share file
- Outside IR35 Contract- SC / DV - Cloud / VMware Solution Architect
- Outside IR35
Solution Architect Contract - with active Security Clearance needed for Outside IR35 Contract London. SC / DV (must be willing to undergo DV) 6 month rolling Immediate Experience delivering technical Security Architecture design / assurance of security design. Specific experience with Cloud and VMWARE technologies Cross domain experience desirable HLD / LLD Current SC Clearance a must. London 3 days a week Immediately interviewing.
- Contract Night Shift Senior SOC Analyst | Microsoft Defender | Outside IR35
- United Kingdom
- Outside IR35
Contract Night Shift Senior SOC Analyst | Microsoft Defender / Sentinel | Outside IR35 Looking for an experienced SOC analyst to cover a night shift SOC operation. Level 2 technical Analyst. You must have current hands on technical experience with Microsoft defender / Sentinel within a customer facing SOC environment. This is a UK based position.
- DV Cleared CyberArk Consultant- Contract
- City of London
- Upto £700 per day
CyberArk Consultant is needed to be responsible for leading the deployment of CyberArk solutions for this Secure government site You will work with customer, helping to create CyberArk Strategic Roadmaps, on-boarding accounts, product and process integration into the CyberArk Solution and Proviso of Installation and technical Documentation. We are looking for this individual to have experience in: In CyberArk deployment, and ideally leady the deployment both strategically and also technically for this project we need the consultant to hold current DV cleared status For the right individual this could be a long term project.