Hundreds Of Apps Loaded Adware Onto Millions Of Android Phones

How many malicious apps would you need on the Google Play Store to infect more than one hundred and fifty million Android devices? Unfortunately, we have a good answer to that question, courtesy of SimBad adware, which can be found in 210 different Android apps.

Taken together, they’ve made their way onto nearly 150 million devices.

If that was the only strain of adware in existence it would be bad enough. Of course, SimBad is only one form of malware.  Granted, it’s a significant strain with a hefty footprint, but the statistics above only demonstrate the sheer scope and scale of the problem. The internet is awash in malware of all types, and the problem is only getting worse.

On top of that, hackers are getting increasingly sophisticated in the way they deploy their poisoned code. Even worse, they’re sharing secrets and adopting each other’s most effective strategies. They’re creating a kind of ‘Black Hat Best Practices’ that enable even hackers with only a moderate level of skill to cause real damage.

If all of the above wasn’t bad enough, even worse is the fact that the larger hacking groups have begun serving as hired guns.  On the Dark Web, it’s easy to find a massive botnet for hire, or to rent out someone else’s malware and leverage their resources to launch your own devastating campaign.

Arrayed against these forces are a motley collection of industry insiders, independent researchers, corporate IT staff members, and security company professionals. They are all trying gamely to keep up with the ever-shifting threat matrix.

Unfortunately, it’s a battle these forces are losing.  2018 was another record setting year in terms of the number of successful data breaches, and 2019 will almost certainly beat last year.  Stay vigilant.

Social Security Administration Seeing High Number Of Scams

The Federal Trade Commission (FTC) recently issued a public service announcement regarding the growing number of Social Security related scams they’ve been getting reports about.

In 2017, just 3,200 people called to report instances of SSA Voice Phishing (called ‘vishing’), with total 2017 losses amounting to some $210,000.

In 2018, that number swelled to more than 63,000 with losses in excess of $16.6 million.  Even worse, these statistics don’t tell the full extent of the story or the amount of growth. That’s because of course, not everyone who falls victim to such scams calls in to report them. So the overall number and the corresponding dollar amount lost is no doubt much higher.

As to the scam itself, there are obviously a number of variations, but broadly speaking, they all follow the same basic script.  A scammer calls, pretending to be someone from the Social Security Administration.  They inform the person they’re speaking to that they’re calling because suspicious activity was spotted as relates to the person’s account (credit applications and the like).

This, they inform the potential victim, has caused their social security to be blocked and suspended, and warn the victim that it’s possible that their bank accounts may be seized as a result of the suspicious activity.

It’s ham-fisted and transparent, but it works a shocking percentage of the time.  Fearful of being cut off and potentially locked out of their life savings, the victims proceed to gladly hand over any and all information the phony SSA official says they need to put the matter right.  That of course includes verification of the victim’s social security number and all their banking information.

Needless to say, it doesn’t end well for the person who hands over all this information. Be aware of it, and make sure any seniors you know are aware of it too.  Anything we can do, collectively, to help stem this tide is a very good thing.

Ransomware Attackers Targeting Larger Companies For More Money

If you haven’t heard of the GrandCrab ransomware strain, it’s something you should put on your company’s radar.  It first emerged as a viable threat in early 2018.

Since that time, its creators have been constantly tweaking and honing their approach, turning it into a devastatingly effective strain.

The latest version GrandCrab 5.2 was released in February 2019, and researchers at Crowdstrike have been digging into both the software and the operating tactics of the group responsible for it.  Their findings are disturbing to say the least.

The creators of GrandCrab are essentially operating their software under and affiliate scheme, where the owners of the software deploy it on behalf of hacker clients, offering it as a service for hire in exchange for 30-40 percent of the profits.  The company is even advertising on black hat forums and across the Dark Web, using ads designed specifically to pique the interest of other hackers in the community.

In addition to that, GrandCrab’s creators are ramping up their own efforts. They are increasingly ignoring smaller targets in preference for large companies with sprawling global networks, seeking a greater infection percentage (and a correspondingly higher payday).

The plan works like this:  Once they get a hold inside a corporate network, rather than triggering the infection immediately, they explore the space and try to use their beach head to expand the number of machines their infectious software resides on.  Only when they’ve achieved deep network penetration that spans a large percentage of the company’s networked machines do they trigger the infection. This results in the mass encryption of files across much (if not all) of the target network, instantly bringing the company to its knees.

The researchers have taken to calling this approach ‘Big Game Hunting’ for obvious reasons., It is proving to be brutally effective because statistically, infected companies are more likely than not to pony up the ransom money being demanded.

All that to say the hackers are getting increasingly savvy and organized.  Don’t let your guard down.

New Windows 10 Update May Cause Gaming Issues

If you’ve installed Microsoft’s March 1st update for Windows 10, version 180G, be aware that a growing percentage of users are reporting performance issues that impact graphics quality and mouse movement. Granted, the issues seem to have the biggest impact on games, with gamers who play games like Destiny 2 and Call of Duty 4. Of course, performance issues are likely to crop up in a variety of other applications as well.

Microsoft engineers are tracking various discussion forums and Reddit threads where the issue surrounding the KB4482887 update is the topic. They have concluded that the biggest performance impacts come from users who are playing older games (upwards of ten years old), but don’t seem to impact people who play newer games nearly as much, which is curious to say the least.

It’s not at all surprising that gamers are the first to report performance issues.  After all, gaming tends to demand quite a lot from a computer system’s resources in ways that mucking around in a spreadsheet simply doesn’t.  Then there’s the fact that gamers live and die based on in-game lag and latency, so even small blips are very noticeable.  Even so, there are several resource intensive Enterprise applications that may suffer similar performance issues.

For their part, Microsoft is on the case and is currently scrambling to provide a fix for the update. Although to this point, they haven’t provided users with a timeframe for when it might be released.

This latest incident follows on the heels of several months’ worth of problematic Windows 10 updates which have left the company with egg on their faces and prompted them to revisit the way they handle QA/QC prior to the release of an update.

Despite the fact that they’ve been working hard to improve their approach, it seems clear that they’re not quite where they need to be yet.  If you haven’t installed the KB4482887 update yet, and you make frequent use of resource-intensive programs, it may be worth holding off until Microsoft issues an update to the update.

Survey Shows Identity Theft Is Common For Americans

How big of a problem do you imagine identity theft to be?  What percentage of Americans do you think have been impacted by it? If you’re like most people, whatever number you selected probably underestimated its impact.  In a recent survey conducted by nCipher, it was discovered that nearly 29 percent (17.6 percent) of respondents admitted that their identities had been stolen.

As a percentage, that may not seem like all that much, although it’s certainly disturbing.  When you consider that the United States is home to some 330 million people, taking 17.6 percent of that yields the depressingly large number of 58,080,000.

Compare that figure to the 2017 estimate of 16.7 million instances of identity theft, and the rampant growth of this type of crime suddenly comes into striking and dismaying focus. If that wasn’t bad enough, a further 16.5 percent of survey respondents said that they had no idea whether they’d had their identity stolen or not.

It’s certainly not fair to conclude that all of the people in this group have had their identities stolen and simply aren’t aware of it.  The simple fact that such a large group of people seem to have little to no awareness of their digital footprint and who might have access to it is beyond disturbing.

The two biggest takeaways from the survey are these:

One: Identity theft is a rapidly growing crime that impacts tens of millions of Americans and it’s growing more common by the day.

Two: A shocking percentage of people have almost no awareness about how secure their digital footprint is, which means they have no real understanding of how to protect themselves from identity theft.

Given the rapid growth in this type of crime, it’s fair to say that sooner or later, most of the people in the second statistic will wind up as part of the first.  Make sure you’re not in either group!