June 14, 2019by businessheadquarters

Malware and the ongoing threats increasing every year

Android Malware Threats up 99% In First Quarter of 2019

In the first quarter of this year the malware threats targeting Android devices were up 99% percent compared to other mobile malware attacks. As mobile devices popularity increases, so does the malicious programs for mobile devices. In the first quarter of this year the number of new banking Trojans doubled. Kaspersky Labs identified 1,369,942 new mobile device threats in the first quarter of 2019. Malware detection broken down by type:

  1. New installation packaged equaled 1,258,436 new threats.
  2. New mobile devices, malicious programs equaled 110,325 new threats.
  3. New mobile device banking Trojans equaled 1,182 new threats.

Mobile banking Trojans and how they work.

1. Faketoken

Faketoken, the top 20 most often detected banking Trojans steals the mTANs that work with other computer-based banking Trojans. When you enter into an online banking session, the computer-based Trojan on your device, uses a web inject to seed a request to the infected web page. Once they receive the request, a download Android application pops-up on your screen indicating you have to install this application to conduct your secure transactions. What you don’t realize is the request redirected you to the Faketoken. Once you install the necessary application the mobile threats on your Smartphone. Once you install the application on your Smartphone, cyber criminals use the computer-based Trojan to gain access to your bank account. The Faketoken allows the cyber criminals to harvest your mTANs and transfer money to their accounts.

2. E-wallet Thefts

In March 2014 Kaspersky Lab identified, a new banking SMS Trojan. The Trojan-SMS AndroidOS Waller steals money from QIWI wallets on infected phones. The Trojan needs to receive the proper C&C command to send a text message to the QIWI system number. When the QIWI sends the response the Trojan intercepts the response and sends it to the operators. Right now this Trojan only targets Russian users, but can possibly be used in any country where text-managed e-wallet systems are commonly used.

3. Malicious Spam

One of the top methods used by cyber criminals to spread mobile malware is through malicious spam. The mobile Trojans steal money from your bank accounts. Cyber criminals rely heavily on social engineering to send the malicious spam texts. The text messages normally contain offers to download apps for your Smartphone or Android devices. The links in the text messages direct you to a website that’s seeded with malicious programs and different offers.

Top 20 Mobile Device Threats of 2019

  1. Trojan-SMS.AndroidOS.Stealer.a
  2. RiskTool.AndroidOS.MimobSMS.a
  3. Trojan-SMS.AndroidOS.OpFake.bo
  4. RiskTool.AndroidOS.Mobogen.a
  5. DangerousObject.Multi.Generic
  6. Trojan-SMS.AndroidOS.FakeInst.a
  7. Trojan-SMS.AndroidOS.OpFake.a
  8. Trojan-SMS.AndroidOS.Erop.a
  9. Trojan-SMS.AndroidOS.Agent.u
  10. Trojan-SMS.AndroidOS.FakeInst.ei
  11. Backdoor.AndroidOS.Fobus.a
  12. Trojan-SMS.AndroidOS.FakeInst.ff
  13. Trojan-Banker.AndroidOS.Faketoken.a
  14. AdWare.AndroidOS.Ganlet.a
  15. Trojan-SMS.AndroidOS.Agent.ao
  16. AdWare.AndroidOS.Viser.a
  17. Trojan-SMS.AndroidOS.Agent.dr
  18. Trojan-SMS.AndroidOS.Agent.fk
  19. RiskTool.AndroidOS.SMSreg.dd
  20. RiskTool.AndroidOS.SMSreg.eh

When using the Internet on your Android device or Smartphone be cautious and refrain from clicking on links from unknown senders. Cyber criminals thrive on social engineering and use this technology to steal money from your account. Using any device to connect to the Internet has ricks so, don’t be a victim, by falling into the trap of a cyber criminal. Protect your Android and Smartphone by installing antivirus software and malware diction.

Top 2019 Antivirus Software for Mobile Devices

  1. BullGuard Mobile Security
  2. Lockout Premium
  3. McAfee Mobile Security
  4. Kaspersky Mobile Security
  5. ESET Mobile Security
  6. Trend Micro Mobile Security
  7. F-Secure Mobile Security
  8. Webroot Secure Anywhere Mobile
  9. NetQin Mobile Security

A Layman’s Guide To Malware

The internet is a powerful and wonderful tool. Many of us would be absolutely stranded without it and our business and personal lives would pretty much grind to a halt. Whilst the World Wide Web is undoubtedly extremely useful, it is also a potentially dangerous place and the unwary can all too easily become the victims of the new wave of cyber-crime.

Here, in layman’s terms, is what you and your family need to know to help keep you safe whilst surfing the net.

Malware and botnets


Viruses are in essence harmful computer programs that can damage your computer. They can be transmitted in various ways and although they differ in the way that they function, they’re all designed to spread to as many computers as possible via the internet, leaving a trail of havoc and devastation in their wake. The objective of viruses is to allow criminals some sort of access to infected computers.


‘Spyware’ and ‘adware’ are terms that can be applied to a number of different technologies. There are two important things that you need to know about them:

1. They can be downloaded onto your computer without your permission or knowledge. This usually happens when you visit an unsafe website or open an attachment in an email.

2. They can also be extremely intrusive; opening advertisements you don’t want to view or even tracking you online, stealing passwords and other confidential information.


Botnets are computers (or networks of computers) that are controlled remotely by criminals. They contain malware – computer viruses, key-loggers and various other types of malicious software – and are used to attack websites, usually for financial gain.

When your computer becomes infected with botnet malware, it communicates with the cyber criminals’ machines and acts on their instructions. Botnets are typically used to steal information such as credit card numbers, bank details, and other personal information like telephone numbers, addresses and social security numbers. This data is then used to carry out identify theft, fraud, website attacks, spamming and distribution of malware.

Protect yourself

1. Keep your machine clean! By installing the most up-to-date security software, operating system and browser you will protect yourself against malware, viruses and the like.

2. If in doubt, chuck it out! One common way in which mischief-makers and criminals can compromise your computer is through tweets, email links and online advertising. Even if an attachment appears to come from a source you know, never open it or download anything if it looks remotely suspicious. The best thing to do is to mark such communications as junk, leave them unopened and then delete them.

3. Don’t forget other devices

It’s not just your computer that could be vulnerable to attack by cyber criminals; any device that connects to the internet could be at risk. Laptops, smart phones, gaming systems and tablets all need protection from malware and viruses. 4. Plug and scan Another potential source of attack are USBs and other external pieces of hardware. These can also be infected by malware and viruses that could get into your computer. Always use up-to-date security to scan them.

In conclusion

So you see, staying safe online doesn’t need to be technically challenging if you follow a few basic guidelines and keep your machine clean. Make it a regular habit to update your security software and operating system and be vigilant around your email inbox.

Finding and Removing Malware infecting your Phone or Computer

Are you tired of malware?

How do you deal with it? Well, if there is one thing that we cannot afford currently, it is to lose the fight against malware.

If your computer is running slower than usual and you are getting many pop-ups then your PC might have fallen victim to spyware, malware or virus even though you might already have an antivirus program installed on the PC. You don’t need to contact a tech geek across town to remove the malware. This article will show you how to dig out malware and keep your computer safe from the attack.

Malware is a short form for malevolent software that is programmed to attack and disrupt computer operations, gain access to private files or gather sensitive information. Thus, malware refers to hostile or intrusive software.

Types of Malware 

Malware can include the following:

  • Viruses
  • Worms
  • Trojan horses
  • Ransomware
  • Rootkits
  • Dialers
  • Keyloggers
  • Adware, malicious BHOs
  • And questionable security ware

It is not always easy to tell if your computer has been compromised or not, because cyber criminals have upped their game and do not often reveal their code or the activities of their program on an infected computer.

How do you know that the computer is infected?

As already mentioned, it is not always easy to know whether your PC has been compromised because cyber criminals have become smarter. Moreover, some of the problems might be caused by hardware failures. Nevertheless, here are the common characteristics of an affected computer.

  • When attempting to access certain pages, you might receive an error “the page cannot be displayed”
  • You notice that your web browser keeps hanging or freezing or becomes unresponsive.
  • The default homepage changes
  • When you try to access security related website, access is denied
  • You are redirected to other websites instead of the one you intended to visit
  • Lots of pop-ups become the order of the day
  • The speed of your PC becomes slower than usual
  • You notice some strange icons on your desktop
  • Your computer suddenly restart without your command
  • Inability to access the control panel, command prompt, task manager or registry editor

It is worth repeating that the ever-evolving malware has made it difficult to detect it and it is not unusual for malware to pop-up in the most unlikely places. This has prompted new malware-detection and prevention issues never seen before.According to MRG Effitas LTD; Cyber-criminals have resorted to making customized malware that are designed to bypass well-known filters. The malware can therefore bypass even the Advanced Persistence Threat defense products.so you should not feel so safe with your products after all because most of them seem to be overrated in so far as protecting your computer system is concerned.

It has even been discovered that you can get malware from unlikely places such as e-cigarettes and ringtones from smartphones. Organizations and individuals should therefore find a way of detecting and responding to the malware attacks to avoid data loss

Tips for removing malware

Try the following tips to remove malware from your computer

  • Enter Safe Mode

Enter your computer on safe mode and disconnect it from the internet (to prevent the malware from spreading).in order to boot your computer in safe mode, restart the computer and repeated press the F8 key and then press the safe mode option.

  • Delete Temporary Files

Now that you’re in Safe Mode, you may want to run a virus scan on the system using a normal anti-virus installed on your PC. But before you do that, delete your temporary files. This will free your computer from doing extra work and speed up the process. You’ll want to use the disk cleanup utility to do this; select Start, then All Programs, then Accessories, then System ToolsDisk Cleanup.

  • Download Malware Scanners

Your scanner will be able to remove most malware, but should you feel that the computer is still laden with malware, download malware software.
Here are examples of malware removal software you can consider:

The problem with most scanners and malware software is that most of them cannot remove 100% of the virus and malware from the computer. So sometimes you might need to use more than one.

The Worst Malware Viruses that Infect Desktop Computers

When your computer is infected with malware it can damage and disable your operating systems and programs. Certain types of malware are easier to detect and isolate. But, there are a few different types of malware that are sophisticated and virtually impossible to detect or destroy.

Therefore, it is important to understand the 4 types of malware that can do the most harm to your computer and network. If one of these 4 types of malware infects your computer, it can be difficult to detect with standard antivirus programs. That is why many people are forced to backup their data and wipe their hard drives in order to destroy the malware. 

Root Kit Malware

The Rootkit malware is created to gain control of your administrator-level access. This allows the hacker or operator of the program to completely take over control of your computer or network. The second goal of the program is to conceal its existence, so it can’t be detected by anti-malware programs.

The Rootkit malware has the ability to completely hide its existence which makes it very difficult to detect. Therefore, once a rootkit virus has infected your computer, it can be practically impossible to detect the virus and remove it from your system. Unfortunately, many computers infected with this virus had to have their hard drive securely erased and reloaded from a trusted backup or system disks. 


The Ransomware virus will hold your computer for ransom and try to extort money. Some hackers encrypt your data with a key and demand large sums of money to be wire transferred to their account to unlock your computer. However, if you fail to send the money, the intruder will threaten to keep your key and never release it. Therefore, your data is locked and useless to you.

In 2013 the most famous Ransomware program was set loose on the Internet. CryptoLocker extorted over 3 million dollars from its victims in the first two months.
However, thanks to the Whitehats they found a key to unlock CryptolLocker Ransomware and restore data. 

Persistent Malware 

Certain malware programs leave traces behind that are difficult to remove. The Persistent Malware infects your computer with multiple malware programs. If an antivirus or malware removal tool detects the infection, it removes or quarantines only part of the malware. However, the malware can’t be completely removed from your computer. Once the infection is removed from your computer the traces of the program can still direct your web browser back to the malware site. Afterwards, the malware re-infects your computer. This type of malware uses a vicious cycle once it is detected to re-infect your computer. 

Firmware-based Malware 

The firmware-based malware is the most difficult malware to detect and remove from your computer. The malware is installed in the hardware components of your bios, hard drive or other peripherals. Furthermore, this form of malware can’t be detected by any anti-virus or malware programs because they aren’t designed to scan your computer’s hardware or firmware. In some cases the only way to successfully remove this virus is to replace the hardware it has infected. 

Malware Removal Tools

Once you suspect your computer has malware installed, it is recommended to download these programs. Scan your computer and remove or quarantine the malware.

dware it has infected. 
Malware Removal ToolsOnce you suspect your computer has malware installed, it is recommended to download these programs. Scan your computer and remove or quarantine the malware.

The Latest Malware Threat To iOS Devices

Mobile malware has been around for a long time now but lately things have taken a turn for the worse as multiple threats to iOS devices have surfaced. It also appears that Android-based smartphones and tablets could also be affected because of the introduction of the new Lollipop operating system. No longer do we need to worry solely about the worst Malware threats for Desktop.

Organisations that embrace enterprise mobility are particularly at risk from the latest malware villains which attack the enterprise provisioning feature. While those businesses that use MDM or EMM will be safe, those without such protection risk having data stolen and are wide open to infection.


The latest malware threat is called, “Masque”. An iOS app installed using the operating system’s ad-hoc provisioning feature is usually targeted or Masque just replaces a genuine app downloaded via the Apple App Store. There is however, one key aspect; both apps have to use the same bundle identifier. For instance, an in-house mobile program could use an app’s actual name to trick the user into installing Masque and it’s at this point that the genuine software is substituted for the malware. This could potentially impact on every application that does not come on iPads and iPhones.

Once successfully installed, Masque makes it possible for hackers to lift information from any app that it replaces. Think about the implications; if the user unwittingly downloads Masque in place of a banking app, all their stored data and future information will be at risk. Hackers would have access to login passwords, banking credentials, emails etc. The attacks are very similar to those by WireLurker, although Masque has actually expanded and improved on what the original malware does; an extremely worrying development for the future.

What about Android

Masque currently affects jail-broken devices running iOS 7.1.1, 7.1.2, 8.0, 8.1 or 8.1.1 beta. In the light of the 2014 Moto X Android device that supports Lollipop OS, it could be that all mobile devices are now at risk from this latest breed of malware.Masque spreads through the airwaves leaving devices like LG G Watch and the G Watch R vulnerable thanks to the new Android OS feature that allows automatic unlocking within range of Bluetooth devices. If adapted correctly, Masque could threaten the Lollipop-based Android tablets and smartphones.

What action should you take?

The average mobile device user will probably not be affected by Masque or any similar mobile malware, so don’t panic. That said, IT departments should be careful about placing their trust in end users and users must stop downloading from untrustworthy sources. Here are some basic 

Tips for locating and Malware Removal.

The best course of action for BYOD enterprises is to put strategies in place to protect their employees and their data from such threats by using EMM Tools.

EMM will allow employees to carry out all business-related work in secure mobile environments whilst keeping their own personal information safe.