This week we take a look at why over half of UK consumers avoid mobile banking apps, how Yahoo’s ad network has been hijacked, and more.
Intercede has revealed that 53 per cent of UK consumers say they would never use mobile banking services.
The survey found that half avoid money transfer apps, and almost a quarter (24 per cent) would not feel safe shopping on the handsets. Furthermore, 75 per cent of those concerned about data loss in the event their mobile device was stolen cited identity theft as their biggest worry.
Meanwhile, Blue Coat Systems has uncovered a malvertising attack that is leveraging major legitimate ad networks such as ads.yahoo.com to drive a CryptoWall Ransomware campaign.
“What looked like a minor malvertising attack quickly became more significant as the cyber criminals were successfully able to gain the trust of the major ad networks like ads.yahoo.com,” said Chris Larsen, Architect of the WebPulse Threat Research Team for Blue Coat Systems.
“The interconnected nature of ad servers and the ease with which would-be-attackers can build trust to deliver malicious ads points to a broken security model that leaves users exposed to the types of ransomware and other malware that can steal personal, financial and credential information.”
Bitdefender has also released new research this week that identifies two Gameover Zeus variants. One generates 1,000 domains per day, while the other generates 10,000 per day.
Bitdefender is also warning that the UK is currently the 6th most infected country for the first version with 24 unique IPs to date.
Our final piece of security news this week comes from Symantec, who has shed light on a cyber-espionage campaign involving sophisticated malware dubbed ‘Turla’.
The campaign has systematically targeted the governments and embassies of a number of former Eastern Bloc countries.
Turla provides the attacker with powerful spying capabilities. Configured to start every time a computer starts, once the user opens a web browser it opens a back door that enables communication with the attackers. Through this back door, the attackers can copy files from the infected computer, connect to servers, delete files, and load and execute other forms of malware, among other capabilities.