Posts

Showing posts with the label cybercrime

How to Remove Panda Banker Trojan?

Image
Zeus Panda, Panda or Panda Banker  is a spin-off of the  Zeus Banking Trojan.  First seen in 2016 as one of the many variants that cropped up in the wake of the Zeus source code, Panda has fulfilled its function as a banking Trojan since then. Looking to harvest credentials of online banking, payments & other financial portals, the majority of its code is derived from the original Zeus Trojan. The Trojan is designed to target Windows Operating system & leverages man-in the browser/ web injects attack techniques to fulfill the purpose of stealing.  Zeus Panda follows its predecessor & hence primarily targets financial sector & crypto currency sites. In addition it expands its attack in different organization sectors like social networking sites, search, Email & adult sites. The attack strategy of this malware is more or less same with some minor modifications in dynamic configurations. The full arsenal of attack techniques adopted by  Pand...

Google Play vulnerable to Fake finance apps target users around the world

Image
Google Play Store is a premier global marketplace to distribute innovative apps and games. Its stringent developer policies make this online platform world’s most trusted source for apps and games.  Google Play Store’s Developer Policies include: * Prohibiting apps with Sexually Explicit or Inappropriate Content that promote hatred, violence, terrorism, bullying and harassment. * Discouraging apps that expose users to deceptive or harmful financial instruments. * Forbid apps that promote illegal activities like illicit sale of drugs, liquor, or tobacco etc * Taboo copied or impersonated apps that aim to deceive users. * Interdict apps that infringe on the intellectual property rights of others. The list of these policies is non-exhaustive. Google Play Store has earned a huge fan following because of these policies. Billions of Android and Windows users rely on Google Play Store to download any app or games. However we should also understand that with evolving technologi...

Guide to remove WhiteClick toolbar from the computer system.

Image
What is WhiteClick Toolbar? WhiteClick Toolbar is malicious program categorized as a potentially unwanted program & classified as a  Browser Hijacker .  This unwanted program trespasses into the system and alters the web browser settings to install its own search engine, home page, new tab and a toolbar without user permission. WhiteClick toolbar uses the method of software bundling as its main mode of transmission. This program can be bundled with third party software like media-players, torrent downloads of popular software etc. The users often rush during the installation of software and fail to notice the additional software within the installer. It is important to always check the Custom/Advanced setting during setup and remove any additional software bundled with the program. Doing this keeps unwanted and intrusive software out of the system. Spam email attachments also contain the virus payload. Cyber crooks use spam emails to get unsuspecting us...

In-app currencies of Mobile games used for Money Laundering by Cyber Crooks!

Image
Mobile Games are now more popular then PC games. Mobile games generate billions of dollars in revenue. Cyber crooks have found a way to exploit the in-game currency to launder real money without the fear of being tracked by government agencies.     The cyber crooks have created a system where they use fake Apple accounts and fake gaming profiles to carry out transactions using stolen credit or debit cards. These game accounts are then sold online for real money and it is transacted using online E-wallet apps. The operation came to light when the researchers stumbled upon a MongoDB database that was left exposed on the internet without any login or password. The free access to this database revealed that it had details of more than 150,000 unique card details which recorded the card number, expiration date and the CVV. The MongoDB database revealed that the details on the sheet were not some ordinary company data but something else entirely. Upon closer inspection,...