Hey there, FixMeFans and StartMeStars! We’re back with another edition of our weekly cybersecurity roundup where we deliver the most recent comings and goings of the cybersecurity world.
This week we’re coming to you with news on a recent surge of fake mobile apps infecting Android users, and the U.S. cracking down on hackers in reaction to the recent Colonial Pipeline and JBS ransomware attacks.
A fake ad block application has been infecting Android users with a Trojan. The virus, known as TeaBot, infects Android devices through a phony ad blocker app, which then sends a clickable link allowing the Trojan to remotely take full control of the device. Through keylogging, cybercriminals can then steal personal information from the device, like banking credentials, and passwords.
The bogus app is not hosted by the official Android app store, but rather third-party websites. The apps use similar names and logos to legitimate apps as to throw off their victims. Once the app is downloaded, it can download even more third party apps that hide on your device, which can then leach more and more personal information.
Need a good LEGITIMATE ad blocker? Check out our top pick HERE!
How can you avoid becoming a victim? Never download any app that isn’t on the official app store. Every application on the Android, Apple, and Microsoft App stores is all vetted and approved by employees, so you know they’re safe to download.
You can read more about the attack HERE!
The United States Justice Department saw a record breaking seizure of over $2 million from the hackers responsible for the Colonial Pipeline ransomware attack last month. Making it one of the most significant triumphs against cyber criminals to date.
The hackers were originally paid $4.4 million in bitcoin by Colonial to unlock their systems, so the $2 million seizure is quite substantial. According to the Washington Post “the difference between the $4.4 million ransom and the $2.3 million seized is essentially due to the drop in the price of bitcoin and the ransomware version of processing fees.” This seizure by the Justice Department is likely to deter future extortion attempts that pose a threat to critical infrastructure.
The recent JBS attack has also turned up the heat on Justice Department officials to implement a prevention and resolution plans against the rising threat of ransomware. The meat processing plant JBS was put to a halt last week when digital ransom notes were discovered by employees. The group responsible for the hacking has been identified as REvil (short for Ransomware Evil), a Russian based cyber-criminal gang.
While operations resumed this Wednesday, the plant is still not back at full capacity. JBS has not stated whether or not they have paid the ransom, and meat prices continue to rise. The frequency of which these attacks have been occurring is sure to motivate more major corporations to implement a backup plan, as well as increase attention on cybersecurity sectors.
You can read more updates on the JBS attack HERE.
It’s also important for you to be weary of ransomware. The best protection is keeping your antivirus up-to-date, running regular FixMeStick scans, and backing up your devices often!
That’s all for this week’s roundup folks! We hope you’re staying safe with all that’s going on, especially when it comes to your cybersecurity!