<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>malware Archives - The Gulf Indians</title>
	<atom:link href="https://thegulfindians.com/tag/malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://thegulfindians.com/tag/malware/</link>
	<description></description>
	<lastBuildDate>Fri, 04 Dec 2020 11:31:03 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://thegulfindians.com/wp-content/uploads/2020/07/fav-100x100.png</url>
	<title>malware Archives - The Gulf Indians</title>
	<link>https://thegulfindians.com/tag/malware/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Indian firms face highest number of malware attacks after US, Japan</title>
		<link>https://thegulfindians.com/indian-firms-face-highest-number-of-malware-attacks-after-us-japan/</link>
					<comments>https://thegulfindians.com/indian-firms-face-highest-number-of-malware-attacks-after-us-japan/#respond</comments>
		
		<dc:creator><![CDATA[The Gulf Indians]]></dc:creator>
		<pubDate>Fri, 04 Dec 2020 11:30:00 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Corporate]]></category>
		<category><![CDATA[Acronis]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberattackers]]></category>
		<category><![CDATA[cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cyberthreats]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.thegulfindians.com/?p=19085</guid>

					<description><![CDATA[<p>India encountered third highest number of malware attacks after US and Japan this year, according to a global leader in cyber protection. Acronis, its 2020 Acronis Cyberthreats Report, released recently laid out an in-depth review of the current threat landscape and projections for the coming year. The report states that 1,168 malware detections were encountered</p>
<p>The post <a href="https://thegulfindians.com/indian-firms-face-highest-number-of-malware-attacks-after-us-japan/">Indian firms face highest number of malware attacks after US, Japan</a> appeared first on <a href="https://thegulfindians.com">The Gulf Indians</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>India encountered third highest number of malware attacks after US and Japan this year, according to a global leader in cyber protection.</p>
<p>Acronis, its 2020 Acronis Cyberthreats Report, released recently laid out an in-depth review of the current threat landscape and projections for the coming year.</p>
<p>The report states that 1,168 malware detections were encountered per 1,000 clients in a month. Maze ransomware detections were reported at 7.8 per cent in Q3 2020 and remote workers and manager service providers were cyberattackers, and data exfiltration outpaces data encryption, both in India and across the globe.</p>
<p>Based on the protection and security challenges that were amplified by the shift to remote work during the COVID-19 pandemic, Acronis warns 2021 will bring aggressive cybercrime activity as criminals pivot their attacks from data encryption to data exfiltration.</p>
<p>Ransomware continues to be the leading threat in India with Maze ransomware accounting for nearly half of all known cases in 2020. Yet the Acronis Cyberthreats Report points to a growing trend of cybercriminals trying to maximize their financial gain. Not content to collect ransoms to decrypt infected data, they steal proprietary – and sometimes embarrassing – data before encrypting it. They then threaten to publicly release the stolen files if the victim doesn’t pay up.</p>
<p>Acronis’ analysts found evidence that more than 1,000 companies globally had their data leaked following a ransomware attack in 2020 – a trend that is expected to accelerate in the coming year, overtaking encryption as the criminals’ primary tactic.</p>
<p>“More than any year in recent memory, 2020 posed a tremendous number of challenges to IT professionals, organizations, and the service providers who support them,” noted Stas Protassov, Acronis co-founder and Technology President. “What we’ve seen is how quickly bad actors are adjusting their attacks to the new IT landscape. By analyzing the activity, attacks, and trends we’ve detected and clearly presenting our findings, we hope to empower our partners and help the IT community at large prepare for the threats on the horizon.”</p>
<p>“When it comes to existing solutions and strategies, the current trends in cyberattacks all show that traditional cybersecurity is failing – globally and in India, it’s usually because of weak technologies and human error, which are both avoidable,” said Rajesh Chhabra, Global Business Development Leader of InsideSales at Acronis. “Just as cybercriminals are evolving their attacks, organizations in India need to advance their protection and security. Comprehensive cyber protection solutions offer the integration and automation that eliminate complexity, optimize performance, and streamline recovery when a successful attack inevitably occurs.”</p>
<p>Among the other notable findings in the Acronis Cyberthreats Report include:<br />
•   Attacks against remote workers will increase. While 31 per cent of global and Indian companies reported daily cyberattacks in 2020, the frequency of attacks targeting their remote workers is projected to increase in 2021, since the defences for systems outside of the corporate network are more easily compromised, giving bad actors access to that organization’s data<br />
•   Ransomware will look for new victims, become more automated. Rather than continuing to cast a wide net, ransomware attackers will focus on targets that provide a bigger return on their efforts. Breaking into one network to steal data from several companies is more profitable than attacking individual organizations. So, while small businesses will still be targeted, cloud environments and organisations such as managed service providers will become more valued targetsbecause their systems can provide access to the data of multiple clients.</p>
<p>Legacy solutions struggle to keep up. Blocking the new malware has rendered traditional antimalware solutions obsolete, as they cannot keep pace with the increased sophistication and frequency of new threats. The average lifespan of a malware sample in 2020 was just 3.4 days. As attackers continue to utilize automation, the number of malware samples will continue to climb. Organisations will need to find new approaches to protection that are agile and designed to stay ahead of new threats. Simple standalone security and backup solutions will no longer be enough.</p>
<p>The recent Cyber Readiness Report 2020 released by Acronis unveiled that 56 per cent of the companies in India reported that their IT costs having increased significantly to counter attacks in the past months – exactly two times the global average. Moreover, India demonstrated the highest rates of video conferencing attacks with 66 per cent of local companies reporting having encountered videoconferencing attacks. India also reported twice as many attacks as any other country, followed by the US and the UAE and 62 per cent of companies in India reported struggling with phishing attempts.</p>
<p>Acronis has been a pioneer in cyber protection, which is the integration of data protection, cybersecurity, and endpoint management. To protect all data, applications and systems, Acronis solutions are designed to address the Five Vectors of Cyber Protection – safety, accessibility, privacy, authenticity, and security (SAPAS).</p>
<p>The Acronis Cyberthreats Report 2020 is based on examining attack and threat data collected by the company’s global network of Acronis Cyber Protection Operations Centers (CPOCs), which monitor and research cyberthreats 24/7. Malware data was collected by more than 100,000 unique endpoints around the world running Acronis Cyber Protect, which launched in May 2020, and covers attacks targeting endpoints detected between June and October. The full report provides in-depth insights into the top security/threat trends the CPOCs observed in 2020, a review of malware families and related statistics, a deep dive into ransomware’s most dangerous groups, the vulnerabilities that contribute to successful attacks, and Acronis’ complete security forecast and recommendations for 2021.<br />
 <br />
Acronis unifies data protection and cybersecurity to deliver integrated, automated cyber protection that solves the safety, accessibility, privacy, authenticity, and security (SAPAS) challenges of the modern digital world. With flexible deployment models that fit the demands of service providers and IT professionals, Acronis provides superior cyber protection for data, applications, and systems with innovative next-generation antivirus, backup, disaster recovery, and endpoint protection management solutions. With award-winning AI-based antimalware and blockchain-based data authentication technologies, Acronis protects any environment – from cloud to hybrid to on-premises – at a low and predictable cost.</p>
<p>Founded in Singapore in 2003 and incorporated in Switzerland in 2008, Acronis now has more than 1,500 employees in 33 locations in 18 countries. Its solutions are trusted by more than 5.5 million home users and 500,000 companies, including 100 per cent of the Fortune 1000, and top-tier professional sports teams. Acronis products are available through 50,000 partners and service providers in over 150 countries in more than 40 languages.</p>
<p>The post <a href="https://thegulfindians.com/indian-firms-face-highest-number-of-malware-attacks-after-us-japan/">Indian firms face highest number of malware attacks after US, Japan</a> appeared first on <a href="https://thegulfindians.com">The Gulf Indians</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://thegulfindians.com/indian-firms-face-highest-number-of-malware-attacks-after-us-japan/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Think before you click</title>
		<link>https://thegulfindians.com/think-before-you-click/</link>
					<comments>https://thegulfindians.com/think-before-you-click/#respond</comments>
		
		<dc:creator><![CDATA[The Gulf Indians]]></dc:creator>
		<pubDate>Thu, 30 Jul 2020 12:52:29 +0000</pubDate>
				<category><![CDATA[India]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[banking security]]></category>
		<category><![CDATA[Black Rock]]></category>
		<category><![CDATA[CERT-India]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">https://www.thegulfindians.com/?p=9479</guid>

					<description><![CDATA[<p>The country’s cyber security agency has issued an alert against an Android malware, dubbed ‘BlackRock’, that has the potential to steal banking and other confidential data of a user. What makes this malware the most dangerous is its ability to extract credentials and credit card information from over 300 apps such as email, e-commerce apps,</p>
<p>The post <a href="https://thegulfindians.com/think-before-you-click/">Think before you click</a> appeared first on <a href="https://thegulfindians.com">The Gulf Indians</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The country’s cyber security agency has issued an alert against an Android malware, dubbed ‘BlackRock’, that has the potential to steal banking and other confidential data of a user.</p>
<p>What makes this malware the most dangerous is its ability to extract credentials and credit card information from over 300 apps such as email, e-commerce apps, social media apps, besides banking and financial apps, the Computer Emergency Response Team (CERT), India said in an advisory.</p>
<p>&#8220;It is reported that a new Android malware strain dubbed &#8216;BlackRock&#8217; equipped with datastealing capabilities is attacking a wide range of Android applications.</p>
<p>&#8220;The malware is developed using the source code of Xerxes banking malware which itself is a variant of LokiBot Android Trojan,&#8221; the advisory said.</p>
<p>CERT is the national technology arm to combat cyber attacks and create a safe Indian cyber space.</p>
<p>The ‘attack campaign’ of this ‘Trojan’ category virus is active globally, said CERT –In.</p>
<p>The predominant feature of this malware is that its target list contains 337 applications including banking and financial applications, and also non-financial and well-known commonly used brand name apps on an Android device that focus on social, communication, networking and dating platforms.</p>
<p>What makes it even more dangerous is its capability to “deflect” majority of anti-virus applications.</p>
<p><strong>Counter-measures</strong></p>
<p>The federal cyber security agency suggested some counter-measures:</p>
<ol>
<li>Do not download and install applications from suspicious sources and use reputed application market only;</li>
<li>Always review the app details, number of downloads, user reviews and check &#8216;additional information&#8217; section before downloading an app from play store.</li>
<li>Use device encryption or encrypt external SD card</li>
<li>Avoid using unsecured, unknown Wi-Fi networks among others.</li>
<li>When it comes to downloading banking apps one should use the official and verified version and</li>
<li>Users should make sure they have a strong AI-powered mobile antivirus installed to detect and block this kind of tricky malware.</li>
</ol>
<p>&nbsp;</p>
<p>The post <a href="https://thegulfindians.com/think-before-you-click/">Think before you click</a> appeared first on <a href="https://thegulfindians.com">The Gulf Indians</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://thegulfindians.com/think-before-you-click/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Beware: Dangerous Fakesky malware returns to spy on you</title>
		<link>https://thegulfindians.com/beware-dangerous-fakesky-malware-returns-to-spy-on-you/</link>
					<comments>https://thegulfindians.com/beware-dangerous-fakesky-malware-returns-to-spy-on-you/#respond</comments>
		
		<dc:creator><![CDATA[The Gulf Indians]]></dc:creator>
		<pubDate>Mon, 06 Jul 2020 09:16:28 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[World]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[Fakesky malware]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">https://www.thegulfindians.com/?p=6318</guid>

					<description><![CDATA[<p>Android users are in great danger, as the dangerous Fakesky malware which was first discovered in Japan in 2017 is now resurfacing with new features. Hackers are not only stealing people&#8217;s personal data through this newly updated malware but are also trying to empty their bank accounts. A report by Cybereason revealed that fakesky will</p>
<p>The post <a href="https://thegulfindians.com/beware-dangerous-fakesky-malware-returns-to-spy-on-you/">Beware: Dangerous Fakesky malware returns to spy on you</a> appeared first on <a href="https://thegulfindians.com">The Gulf Indians</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Android users are in great danger, as the dangerous Fakesky malware which was first discovered in Japan in 2017 is now resurfacing with new features. Hackers are not only stealing people&#8217;s personal data through this newly updated malware but are also trying to empty their bank accounts. A report by Cybereason revealed that fakesky will target users from all around the world.</p>
<p>According to the report,  Fakesky sends users fake text messages thereby prompting the victims to click on a malicious link. This link directs them to download an app. Once the users download this app, then the fake app will get full access to a user&#8217;s personal details in the device including the bank related apps and can also steal login information.</p>
<p>Experts claim that the Chinese group &#8216;Roaming Mantis&#8217; is behind the operation of this app in Asia. This malicious group steals confidential information of the users like phone numbers, device models, telecom providers, OS versions, banking information, IMEI numbers and IMSI numbers. “Our analysis shows that the threat actor behind the FakeSpy malware is a Chinese-speaking group, commonly referred to as &#8220;Roaming Mantis&#8221;, a group that is known to have launched similar campaigns in the past,” researchers wrote in their analysis</p>
<p>The post <a href="https://thegulfindians.com/beware-dangerous-fakesky-malware-returns-to-spy-on-you/">Beware: Dangerous Fakesky malware returns to spy on you</a> appeared first on <a href="https://thegulfindians.com">The Gulf Indians</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://thegulfindians.com/beware-dangerous-fakesky-malware-returns-to-spy-on-you/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
