To celebrate the recent victory of the Tunisian Islamist party, the French satirical magazine "Charlie Hebdo" published a special issue in which it named the prophet Muhammad (also spelled Mohammad) as its editor-in-chief. Late night, the magazine’s offices in Paris were destroyed by a Molotov cocktail attack. The entire French political establishment has condemned this ...
Read Blog
Last week, there was quite a buzz in the mobile-malware researchers community about a new Android malware. It came to light not because of its sophistication or complexity but due to the simple method that it uses to spread. Most Android malware we have witnessed are repackaged malicious apps made available in black markets or ...
Read Blog
Malware is on the rise. At the beginning of 2008, our malware collection had 10 million samples. Today we have already surpassed 70 million. Most of the malicious samples are Trojans (backdoors, downloaders, fake alerts), but there are also a lot of viruses, worms, and bots that in a short time can infect many computers ...
Read Blog
Last year a friend had a bright idea for a party game that involved a series of QR codes in a circle on paper. He called it QR Code Roulette. Unlike the gambling game, selecting the right 2D barcode did not make you a winner. It turned out that every QR code contained a URL ...
Read Blog
In our last blog about Android malware, we discussed the expanding threat landscape for Android malware. Recently, we received an Android package in our collection and observed that this malicious application uses a rooting exploit that targets Android devices running OS Versions 2.3 or earlier to gain root privileges on the compromised device. The malware ...
Read Blog
SpyEye and Zeus are probably the most prevalent and active Trojan "banker" families seen in the wild. (Bankers steal bank passwords and other financial data.) At the beginning of the year there was a rumor about the "merger" of both toolkits into a new generation of banking Trojan. It is not clear yet whether leaked Zeus ...
Read Blog
You would be surprised at the number of places you can find a GSM SIM card. Outside of your mobile phone, they can be found in power meters, water meters, vending machines, etc. These SIM cards (virtually identical to the one in your mobile phone) are used for machine-to-machine communication. Essentially all of these devices need ...
Read Blog
Zeus, also known as ZBot, is one of best-known malware in the industry. The main purpose of this malware is to steal banking credentials, allowing attackers to commit electronic fraud. Until 2010, Zeus existed only for personal computers since this platform was (and still is) the principal medium for electronic transactions. However, due to the ...
Read Blog
This week the Sorbonne University and the French Department of Justice hosted a meeting, the World and Development Institute (IMODEV) International Cybercrime, CyberThreat and CyberFraud Seminar. The audience heard eminent speakers including Pierre Joxe, a Member of the French Constitutional Council and former socialist Minister of the Interior, and Jacques Godfrain, the writer of the so-called ...
Read Blog