{"id":78797,"date":"2014-07-05T18:46:36","date_gmt":"2014-07-05T13:16:36","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=78797"},"modified":"2014-07-05T18:46:36","modified_gmt":"2014-07-05T13:16:36","slug":"new-android-mobile-banking-malware-and-other-it-security-news-and-alerts","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/new-android-mobile-banking-malware-and-other-it-security-news-and-alerts\/","title":{"rendered":"New Android Mobile Banking Malware and Other IT Security News and Alerts"},"content":{"rendered":"<p>While we are all glued to our couches watching our favorite football teams crush one another, let\u2019s direct our attention a bit towards some important IT security news and alerts for this week.<\/p>\n<p><b>An Embarrassing Password Revelation<\/b><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/07\/world_cup_security_center_leak_password_wifi.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-78801 aligncenter\" alt=\"world cup security center leak password wifi\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/07\/world_cup_security_center_leak_password_wifi.jpg\" width=\"578\" height=\"359\" \/><\/a><\/p>\n<p>No example of irony can match what the security team of the FIFA World Cup did in its latest tweet. The team recently tweeted a photograph of their security center. In the photo, Federal Police&#8217;s head of international co-operation Luiz Cravo Dorea is posing with a calm and poised stature, as if sending out a message, \u201cWe have got everything under control.\u201d But what Luiz conveniently forgot was that the big screen behind him had the center\u2019s Wi-Fi SSID and password for the entire world to see. Read more on this <a href=\"https:\/\/thehackernews.com\/2014\/06\/fifa-world-cup-security-team_26.html\" target=\"_blank\">here<\/a>.<\/p>\n<p><b>Database of Domino\u2019s Pizza Hacked<\/b><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/07\/dominoz_hacked.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-78802 aligncenter\" alt=\"Dominoz Server Hacked\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/07\/dominoz_hacked.jpg\" width=\"558\" height=\"323\" \/><\/a><\/p>\n<p>A hacker group has claimed to have hacked the database server of pizza delivery corporation Domino\u2019s. The group that goes by the name Rex Mundi, has claimed to have stolen details of more than 600K customers. Reportedly, the hacker group has demanded a ransom of \u20ac30,000 to keep the data from going public. The data includes addresses, names, phone numbers, email IDs and passwords. The France and Belgium website of the company seems to have been hacked. Read more on this <a href=\"https:\/\/www.ehackingnews.com\/2014\/06\/dominos-pizza-hacked-details-of-650k.html\" target=\"_blank\">here<\/a>.<\/p>\n<p><b>Beware of the HijackRAT Malware<\/b><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/04\/2014-04-07-ts3_thumbs0f4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-78263 aligncenter\" alt=\"HIjackRAT Android Malware\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/04\/2014-04-07-ts3_thumbs0f4.jpg\" width=\"500\" height=\"350\" \/><\/a><\/p>\n<p>A new Android malware is now scampering out in the wild. It goes by the name \u2018HijackRAT\u2019, and it is purported to go after mobile banking apps. This malware can not only steal the victim\u2019s banking information, but also allow the hacker to gain remote access to the infected mobile device. One scary feature of this malware is scanning the infected device for mobile banking apps, and replacing these apps with fake ones. And once the victim uses these fake apps to conduct any banking transaction, the information can easily be stolen by the controller of the malware. Reportedly, eight banks in Korea are being targeted by this malware.<\/p>\n<p><b>Malware Sits in your Browser and Waits Until you Visit a Banking Website<\/b><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/03\/malware.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-78011 aligncenter\" alt=\"Malware steals banking information\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/03\/malware.jpg\" width=\"482\" height=\"270\" \/><\/a><\/p>\n<p>A malware is being circulated via spam messages that infects the victim\u2019s Internet browser and waits until the user visits a banking website. Once a banking website opens up, the malware starts stealing the information provided by the user. As mentioned, this malware is being spread via spam messages that look like they are from a legit company. The messages simply try to trick the user into clicking a link embedded in the message, and that initiates the download of the malicious code. Users are advised to have a reputable anti-virus software on their computer, and be careful of unwanted and unsolicited emails and text messages.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While we are all glued to our couches watching our favorite football teams crush one another, let\u2019s direct our attention a bit towards some important IT security news and alerts for this week. An Embarrassing Password Revelation No example of irony can match what the security team of the FIFA World Cup did in its [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":78516,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[431,990,991,992],"class_list":["post-78797","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-android","tag-fifa-world-cup-news","tag-hijackrat","tag-mobile-banking-malware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/78797"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=78797"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/78797\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=78797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=78797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=78797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}