Advertisement · 728 × 90
#
Hashtag
#ThreatLabz
Advertisement · 728 × 90

Zscaler ThreatLabz: cybercriminelen richten zich vaker op non-web protocollen zoals DNS en SMB

#Persbericht #Zscaler #Cybercriminelen #ThreatLabZ #DomainNameSystem #RemoteDesktopProtocol #SMB #Nonwebprotocollen

0 0 1 0
Preview
Anatsa Unleashed | Android Banking Trojan Targets Over 830 Financial Apps Globally Episode Title: Anatsa Unleashed: How a Sophisticated Android Banking Trojan Targets Over 830 Financial Apps Globally In this episode of "Upwardly Mobile," we dive deep into the alarming evolution of Anatsa, a potent Android banking trojan that has significantly expanded its reach, now setting its sights on over 830 financial applications worldwide . First identified in 2020, Anatsa (also known as Teabot or Troddler) grants its operators full control over infected devices, enabling them to perform fraudulent transactions and steal critical bank information, cryptocurrencies, and various other data on behalf of victims. What You'll Learn in This Episode: • Anatsa's Expanded Targets: Discover how the Anatsa banking trojan has broadened its scope to include more than 150 new banking and cryptocurrency applications, extending its malicious campaigns to mobile users in new countries like Germany and South Korea . • Deceptive Distribution Methods: Understand the cunning ways Anatsa spreads, primarily through decoy applications found on the official Google Play Store . These seemingly harmless apps often masquerade as useful tools like PDF viewers, QR code scanners, or phone cleaners, accumulating over 50,000 downloads in some cases. Once installed, they silently fetch a malicious payload disguised as an update from Anatsa's command-and-control (C&C) server. • Advanced Evasion Techniques: Learn about Anatsa's sophisticated anti-analysis and anti-detection mechanisms, designed to evade security measures. These include decrypting strings at runtime using dynamically generated Data Encryption Standard (DES) keys, performing emulation and device model checks, and periodically altering package names and installation hashes . The malware even hides its DEX payload within corrupted archives that bypass standard static analysis tools. • How Anatsa Compromises Devices: Find out how Anatsa requests and automatically enables critical accessibility permissions upon installation. This allows it to display overlays on top of legitimate applications, tamper with notifications, receive and read SMS messages, and ultimately present fake banking login pages to steal credentials . The trojan also incorporates keylogging capabilities. • Industry Response: Hear about the efforts of cybersecurity firms like Zscaler, which identified and reported 77 nefarious applications distributing Anatsa and other malware families, collectively accounting for over 19 million downloads . While Google has since removed these reported applications and states that Google Play Protect offers automatic protection, the continuous evolution of Anatsa highlights the ongoing threat. Protect Yourself: Cybersecurity experts advise Android users to always verify the permissions that applications request and ensure they align with the intended functionality of the app . -------------------------------------------------------------------------------- Relevant Links to Source Materials: • Source 1: SecurityWeek Article on Anatsa: https://www.google.com/url?sa=E&q=https%3A%2F%2Fsecurityweek.com%2Fanatsa-android-banking-trojan-now-targeting-830-financial-apps%2F • Source 2: Zscaler ThreatLabz Report: https://www.google.com/url?sa=E&q=https%3A%2F%2Fwww.zscaler.com%2Fblogs%2Fsecurity-research%2Fanatsas-latest-updates-android-document-readers-and-deception • Source 3: BSI Report on Anatsa: https://www.google.com/url?sa=E&q=https%3A%2F%2Fwww.bsi.bund.de%2FEN%2FTheBSI%2FCybernationGermany%2FITsecurityIncident%2FAnatsa_Teabot%2Fanatsa_teabot_node.html -------------------------------------------------------------------------------- Sponsor: This episode of "Upwardly Mobile" is brought to you by https://approov.io. Learn more about securing your mobile applications at approov.io. -------------------------------------------------------------------------------- Keywords: Anatsa, Android banking trojan, mobile security, cybersecurity, financial apps, Google Play, malware, credential theft, keylogging, fraudulent transactions, Zscaler, threat intelligence, Android malware, cryptocurrency, mobile banking, data protection, Teabot, Troddler, anti-analysis, C&C server.

📣 New Podcast! "Anatsa Unleashed | Android Banking Trojan Targets Over 830 Financial Apps Globally" on @Spreaker #anatsa #androidmalware #androidtrojan #bankingtrojan #cryptosecurity #googleplay #mobilebanking #securityweek #threatlabz #zscaler

0 0 0 0
Post image

Ransomware-Gruppen haben innerhalb eines Jahres 238 TByte an Daten gestohlen

#Cybersecurity #Datenexfiltrierung #GenAI #Phishing #Ransomware #ThreatLabZ #ZeroTrust @Zscaler @Zscaler_DACH

netzpalaver.de/2025/...

0 0 0 0
Post image

World-Password-Day - Eine passwortlose und sichere Zukunft

#Authentifizierung #FIDO2 #Passwort #Passwortdiebstahl #passwortlos #Passwortstrategie #ThreatLabZ #WorldPasswordDay @Zscaler @Zscale_DACH

netzpalaver.de/2025/...

0 1 0 0
Post image Post image

KI-gesteuerte Cyberangriffe auf kritische Geschäftsabläufe nehmen zu

#CloudSicherheit #Cybersecurity #Cybersicherheit #GenAI #KITäuschung #PhishingasaService #PhishingReport #Security #ThreatLabZ #ZeroTrust @Zscaler @Zscaler_DACH

netzpalaver.de/2025/...

0 0 0 0
Preview
ゼットスケーラーが明かすAIセキュリティの現状と2025年の展望 ゼットスケーラーが発表した2025年版のAIセキュリティレポートが、急増するAI/ML利用とそれに伴うセキュリティリスクを明らかにしました。AIの進化がもたらす利点とリスク、業界別のトンフレンドも注目です。

ゼットスケーラーが明かすAIセキュリティの現状と2025年の展望 #AIセキュリティ #ゼットスケーラー #ThreatLabz

ゼットスケーラーが発表した2025年版のAIセキュリティレポートが、急増するAI/ML利用とそれに伴うセキュリティリスクを明らかにしました。AIの進化がもたらす利点とリスク、業界別のトンフレンドも注目です。

0 0 0 0
Post image Post image

Gefälschte Deepseek-Webseiten verbreiten Malware

#AI #Chatbot #ClipboardInjektion #Cybersecurity #DeepSeek #künstliche Intelligenz #Malware #Security #ThreatLabZ @Zscaler @Zscaler_DACH

netzpalaver.de/2025/...

1 0 0 0
Post image

Windows-Malware Nodeloader verbreitet sich über Links in Online-Spieleplattformen und auf Youtube

#BrowserIsolierung #Cybersecurity #Kryptowährung #Malware #Nodeloader #OnlineGaming #Security #ThreatLabZ @Zscaler_DACH @Zscaler

netzpalaver.de/2025/...

1 0 0 0

A Fortune 50 company paid a record-breaking $75 million ransom payment to the Dark Angels ransomware gang.

The largest known ransom payment was previously $40 million.

#DarkAngels #ThreatLabz #Chainalysis #ransomware #malware #security #potatosecurity #mashers #mashing

0 0 0 0
Preview
Dark Angels ransomware receives record-breaking $75 million ransom A Fortune 50 company paid a record-breaking $75 million ransom payment to the Dark Angels ransomware gang, according to a report by Zscaler ThreatLabz.

A Fortune 50 company paid a record-breaking $75 million ransom payment to the Dark Angels ransomware gang.

The largest known ransom payment was previously $40 million.

#DarkAngels #ThreatLabz #Chainalysis #ransomware #malware #security #cybersecurity #hackers #hacking

1 1 0 0