Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 31 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Fortnite Android announcement breeding malicious Apps

- security professionals have their say

by The Gurus
November 1, 2019
in Mobile Security
Angry Android Malware
Share on FacebookShare on Twitter

Malicious and fake versions of Fortnite have sprung up all over YouTube after the game was announced to launch on Android platforms. Security researchers at Malwarebytes made the discovery whereby various tutorial videos were discovered within sponsored adverts. Even though the adverts and the Epic Games (the game creators) logo all seemed legitimate, the malicious links are in fact stealing content from the iOS app once users begin the downloading process. This requires the user to complete what seems like real verification task to download the “free app” which then directs the user to Google Play. However, if you download the app, this will lead to the Android phone being infected with malware.

We managed to gain insight for leading security professionals to get their take on the situation:

Steve Giguere, lead EMEA engineer at Synopsys:

“As much as we are wary of scam phone calls promising too good to be true offers, and investment schemes like the Initial Coin Offerings promising a blockchain based something for nothing, a website promising a contraband release of a new game feels only too possible due to previous precedents of leaks from government documents to Games of Thrones episode spoilers.

 The temptation for enthusiasts, blinded by fandom and the inevitable peer kudos of getting to play early, combined with the real advantage of not being subjected to real post-release media spoilers, is such that it subverts the good sense to prevent one exploring the realm of questionable websites and dodgy video instructions only to be led down the path to malicious game ending malware. Any form of social engineering is successful because it’s designed around human nature. There’s no shame in being caught out by schemes or scams like these, but we need to learn that where we exhibit human weakness, the cyber-criminal will be present looking to take advantage to turn our nature against us. As attacks like these become more common place, awareness will inevitably follow; but until then, ensure you are running a modern endpoint security program and remember that if you if it looks too good to be true, don’t take the bait. It’s called phishing for a reason.”

Javvad Malik, security advocate at AlienVault:

Criminals will use various tactics to entice users to click on their phishing email, or download their malicious software online from the web, or mobile app store.

Among the popular techniques is to use the lure of ‘early access’. When the latest summer blockbuster comes out, criminals look to put fake malware-ridden movie downloads online. 

Similarly, we see the pre-release of malicious mobile apps in gaming stores which entice users to be among the first to get a game.

We will need to continually improve the defences to stop such malware making its way into app stores, or running on devices. But at the same time, ongoing user awareness is essential to ensure users are savvy to the risks that can affect them. 

Martin Jartelius, CSO at Outpost24

Attacks which require user interaction often focus on one of a subset of attack paths

Promise something for free that usually costs money– Often by pirating an existing product, backdooring it and uploading it to the stores.

Promise something with a perceived value at no cost, but deliver nothing – Free “antivirus” solutions have fallen in this category, for example, or applications which just wrap another company API functionality.

Promise something desirable, like this unlock.

Essentially it boils down to user awareness and behavior– fraud will always be a problem. The statement that if you are not paying you is the product being sold still holds true.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Fire TVs of Amazon Overrun with Extracting Malware

Next Post

Why Infosec Practitioners are Evolving into Data Scientists

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information