Blacklist from RiskIQ Reveals Hundreds of Potentially Malicious Black Friday Apps
Study of Web Properties of Top-10 Brands Finds More Than 6,500 Mobile Apps Are Blacklisted, Magecart on the Rise
RiskIQ, the global leader in digital risk management, released its 2018 Black Friday E-commerce Blacklist, a cyber research study analyzing the results of keyword queries of their Global Blacklist and mobile app database for the most trafficked e-commerce brands of the Thanksgiving shopping weekend in the US and UK. The results revealed the methods cyberthreat actors could employ this Black Friday shopping season, as well as where they’re targeting malicious efforts.
The report’s findings confirmed that threat actors are using these well-known brands specifically to exploit the popularity of Black Friday and Cyber Monday shopping in both web and mobile:
- Of Black Friday-specific apps: more than 5 percent of mobile apps out of the 4,331 total that can be found searching “Black Friday” in global app stores is blacklisted as malicious.
- Threat actors have focused on the top five leading brands in e-commerce. These brands have a combined total of 6,600 blacklisted apps that contain their branded terms in the title or description.
- The top-10 most trafficked brands averaged over 17 blacklisted apps containing both the branded terms and “Black Friday,” in the title or description, showing clear intent by threat actors to leverage the shopping holiday.
- RiskIQ has detected an average of 89,837 monthly instances of magecart, the digital credit card-skimmer, between August and October 2018.
- The report was released as an exponentially increasing number of consumers embrace the Thanksgiving tradition of hunting for Black Friday bargains online: according to Adobe Digital Index, in 2017, online shoppers filled e-commerce cash registers with more than $19.6 billion in sales over Black Friday and Cyber Monday. But ever the opportunists, threat actors set up their operations where the money is, leveraging top e-commerce brands to exploit user traffic looking for Black Friday deals and coupons.
By setting up fake mobile apps and landing pages with fraudulent branding, they fool consumers into downloading unsafe apps and visiting pages that redirect them to other fraudulent or malicious sites. Nearly 40 percent of the massive influx of spending caused by Black Friday and Cyber Monday in 2017 took place on mobile devices, making shoppers increasingly at risk of encountering threats in the mobile space.
The source of RiskIQ’s blacklists is through the collection of internet data, which it gathers by scanning, crawling, and passive-sensing the internet—including web pages, mobile apps and stores, and social websites and apps. RiskIQ’s crawling technology covers more than 300 million mobile devices, 1.8 billion HTTP sessions, hundreds of locations across the world, 40 million mobile apps, and 600 million domain records.
Industry: Cyber Security News
- Outside IR 35 CONTRACT SC CLEARED Cyber Security Operations Analyst SPLUNK ES- UK REMOTE- £500 a day.
6 month contract Outside IR35 Operational Cyber Security Analyst. Hands on Splunk Security Enterprise and Security clearance is required As is someone that holds SC clearance. SOC and Vulnerability management experience. Vulnerability Analysis / Management - Tenable
- SailPoint Consultant
- Upto €80,000
SailPoint Consultant is need for this rapidly expanding global business, The business is currently in the middle of a SailPoint Deployment, they require an experienced Consultant who is able to help them on this Journey You will be responsible for helping to configure and deploy SailPoint as well as on board applications onto the platform You will also work with the business to understand workflow and process to help align the way the business works to ensure that the business gets the most from the deployment We are looking for an experienced SailPoint consultant who has experience with both Deployment and BAU work and is interested in joining a business which is at the start of an interesting IAM Journey
- SOC Manager Security Operations. SIEM, Threat / Vulnerability, IR, SOC Service- Exclusive
- United Kingdom
SOC Manager- SIEM, Threat / Vulnerability, Incident response. Exclusive Project. Management and on growth growth of Security Operations Centre capability. Managing and maturing the team, technical services line and fronting client engagements where needed. An in-depth technical background is essential, experience across SOC SIEM/ Threat Hunting (IR) tools, processes, techniques, operational is a MUST. The role will include, but not limited to; evolving the technical process, building operational capability, managing and hiring team, involved at a high level overviewing policy/playbooks, fine turning of the go-to-market collateral etc.
- Contact 12 month- Security Operations- Tanium Engineer / Analyst.
- United Kingdom
- Dependent on experience
Security Operations engineer / Analyst with Tanium for a 12 month contract. Experience configuring using, managing, supporting troubleshooting Tanium's suite of end point solutions is essential. The opportunity is due to a client expanding its international capability to a follow the sun model. To be involved in spinning up a European capability. Based in the UK. English essential and ideally being fluent in French.