www.verimatrix.com
Open in
urlscan Pro
162.159.137.54
Public Scan
Submitted URL: https://c24p-04.na1.hubspotlinks.com/Ctc/ZN+113/c24p-04/VVLW9Q2wBXflW4pN4qb2B4Nv1W5GRJ1L57CjQNMcSJRv5nXHsW6N1X8z6lZ3lqW928jQY5hCV26W2...
Effective URL: https://www.verimatrix.com/cybersecurity/cybersecurity-insights/cybersecurity-threat-roundup-7-enchant-fjordphantom-imuta-a...
Submission: On January 02 via api from ES — Scanned from ES
Effective URL: https://www.verimatrix.com/cybersecurity/cybersecurity-insights/cybersecurity-threat-roundup-7-enchant-fjordphantom-imuta-a...
Submission: On January 02 via api from ES — Scanned from ES
Form analysis
2 forms found in the DOMPOST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/327778/3b0cf0ec-8ec4-472a-aced-94d2db503aaa
<form id="hsForm_3b0cf0ec-8ec4-472a-aced-94d2db503aaa" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/327778/3b0cf0ec-8ec4-472a-aced-94d2db503aaa"
class="hs-form-private hsForm_3b0cf0ec-8ec4-472a-aced-94d2db503aaa hs-form-3b0cf0ec-8ec4-472a-aced-94d2db503aaa hs-form-3b0cf0ec-8ec4-472a-aced-94d2db503aaa_db3e2457-5ee5-4341-afad-e9af1c9749a7 hs-form stacked"
target="target_iframe_3b0cf0ec-8ec4-472a-aced-94d2db503aaa" data-instance-id="db3e2457-5ee5-4341-afad-e9af1c9749a7" data-form-id="3b0cf0ec-8ec4-472a-aced-94d2db503aaa" data-portal-id="327778" data-hs-cf-bound="true">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-3b0cf0ec-8ec4-472a-aced-94d2db503aaa" class="" placeholder="Enter your Email" for="email-3b0cf0ec-8ec4-472a-aced-94d2db503aaa"><span>Email</span><span
class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-3b0cf0ec-8ec4-472a-aced-94d2db503aaa" name="email" required="" placeholder="name@company.com " type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_gclid hs-gclid hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-gclid-3b0cf0ec-8ec4-472a-aced-94d2db503aaa" class="" placeholder="Enter your gclid"
for="gclid-3b0cf0ec-8ec4-472a-aced-94d2db503aaa"><span>gclid</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="gclid" class="hs-input" type="hidden" value=""></div>
</div>
<div class="legal-consent-container">
<div class="hs-richtext">
<p>By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s
<a href="https://www.verimatrix.com/privacy/" target="_blank" rel="noopener">Privacy Notice</a>.</p>
</div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="SIGN UP"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1704188776252","formDefinitionUpdatedAt":"1700711767119","lang":"en","legalConsentOptions":"{\"legitimateInterestSubscriptionTypes\":[195799,11540568,1285403,28271797],\"communicationConsentCheckboxes\":[{\"communicationTypeId\":28271797,\"label\":\"I agree to receive other communications from Verimatrix.\",\"required\":false}],\"legitimateInterestLegalBasis\":\"LEGITIMATE_INTEREST_PQL\",\"communicationConsentText\":\"Inside Secure is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:\",\"processingConsentType\":\"IMPLICIT\",\"processingConsentText\":\"In order to provide you the content requested, we need to store and process your personal data. If you consent to us storing your personal data for this purpose, please tick the checkbox below.\",\"processingConsentCheckboxLabel\":\"I agree to allow Inside Secure to store and process my personal data.\",\"privacyPolicyText\":\"<p>By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s <a href=\\\"https://www.verimatrix.com/privacy/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">Privacy Notice</a>.</p>\",\"isLegitimateInterest\":true}","clonedFromForm":"a530710b-9b67-4140-babe-053ecdef00ef","renderRawHtml":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36","pageTitle":"Cybersecurity Threat Roundup: Issue #7 – VERIMATRIX","pageUrl":"https://www.verimatrix.com/cybersecurity/cybersecurity-insights/cybersecurity-threat-roundup-7-enchant-fjordphantom-imuta-and-more/?utm_campaign=2023%20Cybersecurity%20One-Off%20Email&utm_medium=email&_hsmi=288066349&_hsenc=p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA&utm_content=288066398&utm_source=hs_email","urlParams":{"utm_campaign":"2023 Cybersecurity One-Off Email","utm_medium":"email","_hsmi":"288066349","_hsenc":"p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA","utm_content":"288066398","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":false,"hutk":"ab9c3f199b76d6c7b618c0e31d97534d","__hsfp":2942230154,"__hssc":"35684543.1.1704188778409","__hstc":"35684543.ab9c3f199b76d6c7b618c0e31d97534d.1704188778409.1704188778409.1704188778409.1","formTarget":"#hbspt-form-db3e2457-5ee5-4341-afad-e9af1c9749a7","rumScriptExecuteTime":2356.9000000953674,"rumTotalRequestTime":2607.9000000953674,"rumTotalRenderTime":2702,"rumServiceResponseTime":251,"rumFormRenderTime":94.09999990463257,"locale":"en","timestamp":1704188778419,"originalEmbedContext":{"portalId":"327778","formId":"3b0cf0ec-8ec4-472a-aced-94d2db503aaa","region":"na1","target":"#hbspt-form-db3e2457-5ee5-4341-afad-e9af1c9749a7","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true},"correlationId":"db3e2457-5ee5-4341-afad-e9af1c9749a7","renderedFieldsIds":["email","gclid"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.4371","sourceName":"forms-embed","sourceVersion":"1.4371","sourceVersionMajor":"1","sourceVersionMinor":"4371","allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1704188776345,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Cybersecurity Threat Roundup: Issue #7 – VERIMATRIX\",\"pageUrl\":\"https://www.verimatrix.com/cybersecurity/cybersecurity-insights/cybersecurity-threat-roundup-7-enchant-fjordphantom-imuta-and-more/?utm_campaign=2023%20Cybersecurity%20One-Off%20Email&utm_medium=email&_hsmi=288066349&_hsenc=p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA&utm_content=288066398&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36\",\"urlParams\":{\"utm_campaign\":\"2023 Cybersecurity One-Off Email\",\"utm_medium\":\"email\",\"_hsmi\":\"288066349\",\"_hsenc\":\"p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA\",\"utm_content\":\"288066398\",\"utm_source\":\"hs_email\"},\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1704188776346,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"ES\""},{"clientTimestamp":1704188778415,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"ab9c3f199b76d6c7b618c0e31d97534d\"}"}]}"><iframe
name="target_iframe_3b0cf0ec-8ec4-472a-aced-94d2db503aaa" style="display: none;"></iframe>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/327778/a530710b-9b67-4140-babe-053ecdef00ef
<form id="hsForm_a530710b-9b67-4140-babe-053ecdef00ef" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/327778/a530710b-9b67-4140-babe-053ecdef00ef"
class="hs-form-private hsForm_a530710b-9b67-4140-babe-053ecdef00ef hs-form-a530710b-9b67-4140-babe-053ecdef00ef hs-form-a530710b-9b67-4140-babe-053ecdef00ef_e725548c-14df-4bb4-8e1f-cf7003491acd hs-form stacked"
target="target_iframe_a530710b-9b67-4140-babe-053ecdef00ef" data-instance-id="e725548c-14df-4bb4-8e1f-cf7003491acd" data-form-id="a530710b-9b67-4140-babe-053ecdef00ef" data-portal-id="327778" data-hs-cf-bound="true">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-a530710b-9b67-4140-babe-053ecdef00ef" class="" placeholder="Enter your Email" for="email-a530710b-9b67-4140-babe-053ecdef00ef"><span>Email</span><span
class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-a530710b-9b67-4140-babe-053ecdef00ef" name="email" required="" placeholder="name@company.com " type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_gclid hs-gclid hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-gclid-a530710b-9b67-4140-babe-053ecdef00ef" class="" placeholder="Enter your gclid"
for="gclid-a530710b-9b67-4140-babe-053ecdef00ef"><span>gclid</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="gclid" class="hs-input" type="hidden" value=""></div>
</div>
<div class="legal-consent-container">
<div class="hs-richtext">
<p>By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s
<a href="https://www.verimatrix.com/privacy/" target="_blank" rel="noopener">Privacy Notice</a>.</p>
</div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="SIGN UP"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1704188776293","formDefinitionUpdatedAt":"1701247339036","lang":"en","legalConsentOptions":"{\"legitimateInterestSubscriptionTypes\":[28271797],\"communicationConsentCheckboxes\":[{\"communicationTypeId\":28271797,\"label\":\"I agree to receive other communications from Verimatrix.\",\"required\":false}],\"legitimateInterestLegalBasis\":\"LEGITIMATE_INTEREST_PQL\",\"communicationConsentText\":\"Inside Secure is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:\",\"processingConsentType\":\"IMPLICIT\",\"processingConsentText\":\"In order to provide you the content requested, we need to store and process your personal data. If you consent to us storing your personal data for this purpose, please tick the checkbox below.\",\"processingConsentCheckboxLabel\":\"I agree to allow Inside Secure to store and process my personal data.\",\"privacyPolicyText\":\"<p>By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s <a href=\\\"https://www.verimatrix.com/privacy/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">Privacy Notice</a>.</p>\",\"isLegitimateInterest\":true}","clonedFromForm":"98b07e3a-eca9-414b-9f41-2f4161f72a9d","renderRawHtml":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36","pageTitle":"Cybersecurity Threat Roundup: Issue #7 – VERIMATRIX","pageUrl":"https://www.verimatrix.com/cybersecurity/cybersecurity-insights/cybersecurity-threat-roundup-7-enchant-fjordphantom-imuta-and-more/?utm_campaign=2023%20Cybersecurity%20One-Off%20Email&utm_medium=email&_hsmi=288066349&_hsenc=p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA&utm_content=288066398&utm_source=hs_email","urlParams":{"utm_campaign":"2023 Cybersecurity One-Off Email","utm_medium":"email","_hsmi":"288066349","_hsenc":"p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA","utm_content":"288066398","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":false,"hutk":"ab9c3f199b76d6c7b618c0e31d97534d","__hsfp":2942230154,"__hssc":"35684543.1.1704188778409","__hstc":"35684543.ab9c3f199b76d6c7b618c0e31d97534d.1704188778409.1704188778409.1704188778409.1","formTarget":"#hbspt-form-e725548c-14df-4bb4-8e1f-cf7003491acd","rumScriptExecuteTime":2384.5,"rumTotalRequestTime":2687.699999809265,"rumTotalRenderTime":2749.5999999046326,"rumServiceResponseTime":303.19999980926514,"rumFormRenderTime":61.90000009536743,"locale":"en","timestamp":1704188778422,"originalEmbedContext":{"portalId":"327778","formId":"a530710b-9b67-4140-babe-053ecdef00ef","region":"na1","target":"#hbspt-form-e725548c-14df-4bb4-8e1f-cf7003491acd","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true},"correlationId":"e725548c-14df-4bb4-8e1f-cf7003491acd","renderedFieldsIds":["email","gclid"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.4371","sourceName":"forms-embed","sourceVersion":"1.4371","sourceVersionMajor":"1","sourceVersionMinor":"4371","allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1704188776426,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Cybersecurity Threat Roundup: Issue #7 – VERIMATRIX\",\"pageUrl\":\"https://www.verimatrix.com/cybersecurity/cybersecurity-insights/cybersecurity-threat-roundup-7-enchant-fjordphantom-imuta-and-more/?utm_campaign=2023%20Cybersecurity%20One-Off%20Email&utm_medium=email&_hsmi=288066349&_hsenc=p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA&utm_content=288066398&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36\",\"urlParams\":{\"utm_campaign\":\"2023 Cybersecurity One-Off Email\",\"utm_medium\":\"email\",\"_hsmi\":\"288066349\",\"_hsenc\":\"p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA\",\"utm_content\":\"288066398\",\"utm_source\":\"hs_email\"},\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1704188776426,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"ES\""},{"clientTimestamp":1704188778419,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"ab9c3f199b76d6c7b618c0e31d97534d\"}"}]}"><iframe
name="target_iframe_a530710b-9b67-4140-babe-053ecdef00ef" style="display: none;"></iframe>
</form>
Text Content
Skip to content * VMX Labs * Partners * Partners Portal * About * Verimatrix.com * VMX Labs * Partners * Partners Portal * About * Verimatrix.com * Learn Learn A closer look THE XTD DIFFERENCE Going beyond MTD and EDR. AGENTLESS TELEMETRY Cybersecurity without inconvenience to consumers. SHIFT LEFT – CI/CD INTEGRATION Injecting security early in the development process. SIEM INTEGRATION Providing a comprehensive view of your security environment. HUMAN & MACHINE Combining AI/ML with human expertise to respond effectively. ZERO TRUST Eliminating implicit trust in favor of continuous validation. VMX labs Our cybersecurity resource hub with the latest threat advisories and commentaries from experts. Visit VMX Labs Browse resources * Cybersecurity Insights * White Papers * Ebooks * Knowledge Base * Cybersecurity Manifesto * Cybersecurity Insights * White Papers * Ebooks * Knowledge Base * Cybersecurity Manifesto Get the latest cybersecurity insights Email* gclid By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s Privacy Notice. * Product Verimatrix XTD™– Mobile App Protection Extended Threat Defense XTD was engineered to monitor new entry vectors from the fastest growing attack surface: connected apps, APIs, and unmanaged devices. View product XTD's powerful SaaS features Prevent Formerly App Shield. Start with RASP and shielding to create bulletproof apps. Detect & Respond Monitor and detect attacks. Receive guidance to apply countermeasures. Predict Actionable threat intelligence to prepare for future attacks. Security Center Cybersecurity Products * Web Protect * App Shield * Code Shield * Key Shield * Web Protect * App Shield * Code Shield * Key Shield Techniques * Code Obfuscation * Anti-tamper Technology * Jailbreak Detection * Root Detection * Environmental Checks * Anti Reverse Engineering * Code Obfuscation * Anti-tamper Technology * Jailbreak Detection * Root Detection * Environmental Checks * Anti Reverse Engineering * Customers Customers By industry FINANCIAL SERVICES BANKING E-COMMERCE HEALTHCARE GAMING By persona CISO Gain complete visibility of security risks to protect revenue streams. SECURITY OPERATIONS CENTER Effectively manage incident response and reporting. RESEARCH & DEVELOPMENT AND ENGINEERING Secure apps early in the development process for faster speed-to-market. FRAUD PREVENTION DEPARTMENT Strengthens anti-fraud measures by illuminating blindspots where fraudsters can attack. More * VMX Labs * Partners * Partners Portal * About * Verimatrix.com * VMX Labs * Partners * Partners Portal * About * Verimatrix.com * Pricing Talk to us Back to VMX Labs Cybersecurity Threat Roundup #7: Enchant, FjordPhantom, IMUTA, and more SHARE THREAT ROUNDUP CYBERSECURITY THREAT ROUNDUP #7: ENCHANT, FJORDPHANTOM, IMUTA, AND MORE December 26, 2023 TABLE OF CONTENTS 1. Threat info 2. Vulnerabilities & patches 3. Intelligence reports With a special focus on mobile apps and connected, unmanaged devices, this VMX Labs Cybersecurity Threat Roundup is compiled by Verimatrix cybersecurity researchers and data scientists. It includes links to notable threat advisories over the last month, information on vulnerabilities and patches, and links to recent intelligence reports. THREAT INFO * Enchant, a new Android malware, targets Chinese-speaking people with a special focus on cryptocurrency wallet apps. It abuses the Accessibility service to steal private keys, wallet addresses, mnemonic phrases, asset details, and wallet passwords. It is distributed through fake adult websites. * FjordPhantom, a new Android banking trojan, targets mobile banking customers in Southeast Asia. It runs the original banking app in a virtual container and attaches a hooking framework to bypass security mechanisms in the app. It is worth mentioning that one victim lost a staggering 10 million Thai Baht (€262,000) to this malware. * Fraudulent apps impersonating legitimate organizations in the banking, government services, and utilities sectors steal banking credentials and payment information from Android users in India. These fake apps also access SMS messages to obtain one-time passwords (OTPs) and bypass multi-factor authentication (MFA). * The incremental malicious update attack (IMUTA) demonstrates a proof-of-concept to bypass the Play Store vetting process by incrementally updating a benign app with malicious features. * Kamran spyware is a recently-discovered Android spyware targeting Urdu-speaking people in the disputed Gilgit-Baltistan region, north of Kashmir. * Property accounts are heavily under attack on booking.com. Users should be careful of in-app messages coming from legitimate property accounts. In ongoing campaigns, adversaries target property accounts, and in the event of successful account access, they send well-crafted phishing messages to upcoming guests to steal their payment information. Since reading a message coming from a legitimate source in the official app can be very convincing, the likelihood of victims following the instructions in the message and inputting their payment information is high. * SecuriDropper is a Dropper-as-a-Service (DaaS) offer that helps mobile malware bypass the Restricted Settings security feature introduced in Android 13. This feature prevents sideloaded apps from gaining Accessibility service permissions. Dropper services provide a session-based installation of the malware that deceives Android’s decision process about the source of an app’s installation (sideloaded versus official app stores). With the increasing adoption of Android 13, the usage of dropper services by threat actors has been rising. * SpyC23, an Android spyware developed by Arid Viper APT, abuses Android’s Accessibility service and is distributed through trojanized Telegram and Skipped Messenger apps in the most recent campaign. * The malware campaign discovered in the summer of 2023 still actively attacks Iranian mobile bank users. The threat actor has added new banks to the target list and developed overlay attack capability since then. * WhatsApp mods spying on people mostly in Azerbaijan and more than a hundred other countries have been discovered. Threat actors spread these malicious WhatsApp mods via Telegram channels and websites. They not only steal victims’ personal data, files, and device information, but also record private conversations stealthily. VULNERABILITIES & PATCHES * Apple patched two zero-days (CVE-2023-42916 and CVE-2023-42917) in the iOS 17.1.2 release. INTELLIGENCE REPORTS * The Kaspersky’s Gaming-Related Cyberthreats in 2023 report shows that 436,786 attempts to infect mobile devices of 84,539 users were detected in a year. Minecraft is by far the most misused game brand, making up 90% of the total attempts. Minecraft is followed by PUBG – Battlegrounds Battle Royale (5%) and Roblox (3%). * Anubis, AhMyth, and Hiddad were the top three mobile malwares in October 2023, according to Check Point’s Most Wanted Malware Report. * The Kaspersky’s Crimeware and Financial Cyberthreats in 2024 report forecasts that mobile malware will increasingly target direct payment systems like PIX in Brazil, FedNow in the USA, and UPI in India and utilize the automated transfer system (ATS) technique in 2024. * The National Cyber Security Centre’s report states that Android device infections in the public sector of the United Kingdom have increased. Sharkbot, Octo, Gigabud, and Joker malware families were detected. PROTECT YOUR DIGITAL WORLD Don’t miss out on the latest threats, vulnerabilities, and intelligence reports. Join our newsletter to stay one step ahead in the ever-evolving world of cybersecurity for mobile apps and connected devices. Email* gclid By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s Privacy Notice. WRITTEN BY DENIZ KABAKCI Deniz Kabakci is a senior security engineer at Verimatrix and writes for VMX Labs. SHARE THIS CYBERSECURITY INSIGHT OTHER CYBERSECURITY INSIGHTS Commentary ENHANCING APPLICATION SECURITY PROTECTIONS: A LOOK AT THE ZERO-CODE INJECTION APPROACH TO PREVENT REVERSE-ENGINEERING Zero-code injection technology serves as a high-value yet low-effort security measure that significantly enhances an application’s protection against reverse-engineering. * 9 months ago * 3 Mins Commentary THE DARK SIDE OF DISCOUNTS: VOUCHER FRAUD IN MOBILE APPS Beware of fake vouchers in your mobile apps! Discover the tactics fraudsters employ to exploit discounts and compromise user experiences. * 3 weeks ago * 2 Mins Commentary WHAT YOU DON’T KNOW CAN HACK YOU: SOFTWARE SUPPLY CHAIN ATTACKS IN MOBILE APPS Mobile app developers, stay vigilant! Defend against software supply chain attacks with secure code reviews, regular updates, and monitoring. * 5 months ago * 3 Mins Commentary A LOOK BEYOND TRADITIONAL RASP, MTD AND WAF TECHNOLOGIES The need for proven measures to protect them against malicious attacks remains more important than ever for any organization dependent on the success of critical applications. * 9 months ago * 5 Mins Follow us Linkedin Facebook Products * Extended Threat Defense (XTD) * XTD Prevent (formerly App Shield) * XTD Detect & Respond * XTD Predict * Extended Threat Defense (XTD) * XTD Prevent (formerly App Shield) * XTD Detect & Respond * XTD Predict Industries * Financial Services * E-commerce * Healthcare * Gaming * Banking * Financial Services * E-commerce * Healthcare * Gaming * Banking Personas * CISO * Security Operations Center * R&D and Engineering * Fraud Prevention Department * CISO * Security Operations Center * R&D and Engineering * Fraud Prevention Department Learn * The XTD Difference * Agentless Telemetry * Shift left – CI/CD integration * Human & Machine * Zero Trust * SIEM Integration * The XTD Difference * Agentless Telemetry * Shift left – CI/CD integration * Human & Machine * Zero Trust * SIEM Integration Resources * VMX Labs * Cybersecurity Manifesto * Cybersecurity Insights * White Papers * Knowledge Base * Ebooks * VMX Labs * Cybersecurity Manifesto * Cybersecurity Insights * White Papers * Knowledge Base * Ebooks Verimatrix * Pricing * Partners * Partners Portal * About * Verimatrix.com * Contact * Talk to a specialist * Pricing * Partners * Partners Portal * About * Verimatrix.com * Contact * Talk to a specialist Our Offices United States 6059 Cornerstone Ct W, San Diego, CA 92121 united.states@verimatrix.com France Impasse des carrés de l’Arc Rond-point du Canet, 13590 Meyreuil france@verimatrix.com Cookies preferences | Terms of Use | Privacy Notice © 2024 Verimatrix. All Rights Reserved Clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts Reject all cookies Accept all cookies Cookies preferences COOKIES PREFERENCES When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Accept all cookies COOKIES PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. View Vendor Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. View Vendor Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. View Vendor Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. View Vendor Details Back Button VENDORS LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm my choices × ×