medium import medium import | Sirin Labs
USD
English
Home / medium import / Tagged: trojan

The Mobile Watering Hole: How A Sip Leads to A Trojan Compromise

“Watering Hole” is a cyber attack strategy in which the victim is a particular group (organization, industry, or region). In this attack, the attacker typically observes which websites or applications the group often uses and infects one or more of them with malware. Eventually, some members of the targeted group become infected.   The method … Read More

The post The Mobile Watering Hole: How A Sip Leads to A Trojan Compromise appeared first on Zimperium Mobile Security Blog.

The Mobile Watering Hole: How A Sip Leads to A Trojan Compromise

“Watering Hole” is a cyber attack strategy in which the victim is a particular group (organization, industry, or region). In this attack, the attacker typically observes which websites or applications the group often uses and infects one or more of them with malware. Eventually, some members of the targeted group become infected.   The method … Read More

The post The Mobile Watering Hole: How A Sip Leads to A Trojan Compromise appeared first on Zimperium Mobile Security Blog.

Threat Research: zTorg Trojan Variations

This Threat Research is about two variations of the zTorg mobile trojan recently discovered in Google Play by Kaspersky researcher, Roman Unucheck. In his blog post, Unucheck described the two variations as “Magic browser” and “Noise Detector”. According to Unucheck, “Magic browser” was uploaded to Google Play on May 15, 2017 and was installed more than 50,000 times. … Read More

The post Threat Research: zTorg Trojan Variations appeared first on Zimperium Mobile Security Blog.