Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Scams & Phishing Security Education Videos Mobile Security Your Security Education Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
CherryBlos-soms Bloom In April But Stink Up Your Android Device All Year
Facebook   X   LinkedIn   Email

CherryBlos-soms Bloom In April But Stink Up Your Android Device All Year

September 5, 2023

Summer is nearly over, but cybercriminals don't really pay much attention to the seasons. The time of year, when the Cherry trees bloom, is also a great time for cybercriminals to pollinate Android devices with malware. But as we’ve recently found out, they don’t stop when summer begins. Their devious ploys continue year-round. Researchers at Trend Micro have recently found some malware called CherryBlos being distributed as the cryptocurrency mining application, SynthNet.

This tactic of stealing passwords to steal cryptocurrency and banking account information is old news. However, the way CherryBlos does it is creative, and as far as is known, it’s the first of its kind to do it this way. It uses optical character recognition (OCR) to scan images and steal passwords.

You might be wondering how it could get a password from an image on your smartphone. Well, as it turns out, even though it’s not recommended, there are some who take screenshots of their passwords and store them on their phones. Those are what this malware targets.

Trend Micro also found SynthNet running on money making scam apps in the Google Play store. Below are a couple examples:

Of course, there is more to this. CherryBlos also uses fake overlays to imitate legitimate banking and crypto apps. The hackers install the malware in these to get access to usernames and passwords.

If OCR sounds familiar, it’s because it’s been around a while and is used in many PDF editors. It scans images and photos and pulls text from it so you don’t have to retype it all in order to edit it.

Always keep a healthy dose of skepticism when downloading apps. Make sure you’re getting the right one. Use the official stores for your devices and do some research before hitting that “get” key. If the reviews are all stellar and there aren’t a lot of them, maybe wait a bit. If there is anything negative about an app, the early adopters will alert you in reviews.

The SynthNet app was previously available in the Play Store but was removed by Google before it went into full bloom. It was “only” downloaded a few thousand times before that; but remember…it only takes one time for a bad app to stink up your device.


Mobile Banking Apps Continue To Be A Hi Value Target For Cybercriminals

Mobile Security

Mobile Banking Apps Continue To Be A Hi Value Target For Cybercriminals

It’s that time of year when organizations that track cybersecurity stats and other information start to release their results. And to no one’s surprise, mobile banking has been under attack in 2021. The Nokia 2021 Threat Intelligence Report found the cybercriminals’ desire to steal your banking credentials has ramped up throughout the year by logging your keystrokes, taking screenshots, trying to snag those two-factor authentication (2FA) codes, and using overlays. There’s no lack of trying to get your confidential information…and your money. READ FULL STORY

Keeping Your Mobile Device Apps Virus Free

Mobile Security

Keeping Your Mobile Device Apps Virus Free

It’s no secret that cybercriminals take advantage of anxiety-filled times and the current coronavirus pandemic (COVID-19) is most certainly one of those moments. The latest cybersecurity news reports that Android smartphones are being targeted with apps claiming to have up-to-date data on COVID-19. These infected apps promise the latest updates, but to unsuspecting users who download them, they also promise malware will surely be installed on your mobile device. READ FULL STORY

Financial Fraud Evolves As Fraudsters Ramp Up Their Attacks

Your Security

Financial Fraud Evolves As Fraudsters Ramp Up Their Attacks

Cybercriminals are stepping-up to the surge in opportunities for financial fraud. The new products and services that financial institutions (FIs) offer to compete for customers, gives fraudsters new avenues to exploit. Expanding banking options give FIs the ability to battle for customers with their marketing approach. But for many FIs and their clients, bad actors are also responding to these banking options. For all the wrong reasons, they too appreciate additional channels for banking, but only as an opportunity to expand their fraudulent attacks. READ FULL STORY

Has Your Account Been Compromised? Five Cyber Smart Tips Everyone Can Use

Your Security

Has Your Account Been Compromised? Five Cyber Smart Tips Everyone Can Use

The transition to living life through our devices has become very real for scores of people and businesses. By now, the coronavirus has changed our lives in ways we never expected. This transition includes doing most things from home. Unfortunately, adapting to online life also gives bad actor’s a cornucopia of targets to exploit. There are proactive steps to take when you suspect an account may be compromised, including ways to help keep it from happening to begin with. READ FULL STORY

Bootleg Apple Software Hides Cryptomining Malware On Macs

Your Security

Bootleg Apple Software Hides Cryptomining Malware On Macs

For those keeping up with technology news, it’s not often Macs make hacking headlines. And for those who are simply Mac lovers, it’s not wise to think hacks happen only to Androids since both are vulnerable. A recent finding linking bootleg Apple software, malware, and cryptomining is a lesson all users can learn from. After all, a successful attack on Macs can end up targeting Androids, too. Security researchers at Jamf Threat Labs found a bootleg version of Final Cut Pro Apple software hiding cryptomining malware. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...