Bleeping Computer: Russian cyberspies use Gmail to control updated ComRAT malware

Bleeping Computer: Russian cyberspies use Gmail to control updated ComRAT malware. “ESET security researchers have discovered a new version of the ComRAT backdoor controlled using the Gmail web interface and used by the state-backed Russian hacker group Turla for harvesting and stealing in attacks against governmental institutions.”

New Ransomware Tactic Called “Double Extortion” Discovered (Make Tech Easier)

Make Tech Easier: New Ransomware Tactic Called “Double Extortion” Discovered . “As you may guess from the name, “double extortion” works by attacking the business twice over. It still uses a database-encryption attack to extort money, but it adds an extra initial attack to ensure a backup doesn’t render the attack useless. First, before the malware developer attacks with ransomware, they breach in the company’s database. They extract as much data as they can and store it on their servers. After that, they conduct the ransomware attack as normal.”

The Register: Multi-part Android spyware lurked on Google Play Store for 4 years, posing as a bunch of legit-looking apps

The Register: Multi-part Android spyware lurked on Google Play Store for 4 years, posing as a bunch of legit-looking apps . “A newly uncovered strain of Android spyware lurked on the Google Play Store disguised as cryptocurrency wallet Coinbase, among other things, for up to four years, according to a new report by Bitdefender.”

Exclusive: Google removes 49 Chrome extensions caught stealing crypto-wallet keys (ZDNet)

ZDNet: Exclusive: Google removes 49 Chrome extensions caught stealing crypto-wallet keys. “Google has removed 49 Chrome extensions from the Web Store that posed as legitimate cryptocurrency wallet apps but contained malicious code that stole crypto-wallet private keys, mnemonic phrases, and other raw secrets.”

Please, just stop downloading apps from unofficial stores: Android users hit with ‘unkillable malware’ (The Register)

The Register: Please, just stop downloading apps from unofficial stores: Android users hit with ‘unkillable malware’ . “Known as xHelper, the malware has been spreading mainly in Russia, Europe, and Southwest Asia on Android 6 and 7 devices (which while old and out of date, make up around 15 per cent of the current user base) for the past year from unofficial app stores. Once on a gizmo, it opens a backdoor, allowing miscreants to spy on owners, steal their data, and cause mischief.”

Ubergizmo: Malware-Laden Fake Best Buy USB Drives Are Being Sent Out In The Mail

Ubergizmo: Malware-Laden Fake Best Buy USB Drives Are Being Sent Out In The Mail. “If you happen to receive a letter from Best Buy that comes with a free USB drive inside of it, don’t rejoice just yet. This is because according to a report from Trustwave, it seems that these USB drives are filled with malware that could hijack your computer if you were to insert it into your PC.”

BetaNews: Click-fraud malware found lurking in more than 50 Play Store apps

BetaNews: Click-fraud malware found lurking in more than 50 Play Store apps. “Researchers at Check Point have identified an auto-clicker malware family operating inside the Google’s Play Store. Disguised in over 56 applications and downloaded over 1,000,000 times globally, the malware — dubbed ‘Tekya’ — commits mobile ad fraud by imitating the actions of a user, clicking ads and banners from ad agencies like Google’s AdMob, AppLovin’, Facebook, and Unity.”