Lost24

Experts from Lookout warn against new wave of malware (or surveillanceware to be more precise) attacks directed at users using Android devices.


Monokle is operated remotely by another application. The malware is able to register user actions, such as key input, capture photos, videos, browser history, and worse, user’s PIN, pattern or password.


The malware is hidden in applications that pretend to be popular apps for Android.


The creation of Monokle was facilitated by a Russian company called STC, which manufactures drones and other equipment for the Russian military. Lookout claims that the malware is directed at people associated with rebel forces in Syria, which can be conf

Lost24

Summer vacation is in full swing, meanwhile heavily besieged seaside resort of Sopot has seen a fresh wave of scams - the police has so far filed few complaints from cheated tourists.


Fraudsters offer fictitious flats for rent, only after arriving at the destination tourists realize that in reality such place does not exist. Prior to reaching the rented apartment the victims are asked to pay a deposit.


Trójmiasto.pl describes the story of a man from the Kuyavian-Pomeranian region who found apartment for rent at one of the portals. The offered seemed so legit that the man has paid an advance of PLN 600 immediately after booking. After reaching the listed address it turned out that the apartment did not exi

Lost24

Cybercriminals posing for central office workers attempted to attack local stores of Play mobile operator. They have called local customer service centers trying to “help” update their customer relationship management (CRM) software.


According to Zaufana Trzecia Strona, the alleged update led to the installation of malicious software. Most possibly, at least a dozen centers were infected on a daily basis, and the entire attacked lasted from July 5th, 2019. Experts from Zaufana Trzecia Strona inform that the fake page which Play store employees were redirected to looked similar to the https://konto.play.pl, however it also contained additional or modified elements.


It could be expected that cybercrimina

Lost24

Users of Android devices should be on their guard, as new kind of malicious software known as Agent Smith has appeared on the network.


The virus is dangerous due to the fact that it can impersonate popular mobile applications. According to security experts from Check Point, Agent Smith is used to display unwanted ads, but there is nothing in its way to prevent it from being used to steal login data for mobile banking applications.


Fortunately, people who use the official Google Play Store are not at risk of an infection. However, it would seem that Agent Smith should not appear on fairly secure 9Apps, yet here we are…


According to Check Point, 25 million users had th

Lost24

Services in the field of Internet of Things (IoT) involve a high risk of confidential data loss. One such example can be recent database leak of ORVIBO Technology Co, a Chinese manufacturer of smart home solutions. This company has millions of users around the world.


The company manufactures gadgets intended for smart homes, linked to lighting, power, security and entertainment systems.


According to the website Niebezpiecznik, which cites report of vpnMentor on recent leak of database which included 2 billion logs concerning various devices. The database contains information such as e-mail addresses with usernames and passwords, codes for resetting accounts, as well as device location data, which indicates

Lost24

Experts from Checkpoint and CyberInt have made a controlled attack on the servers of Origin, where users have access to EA games. About 300 million people with an Origin account were potentially affected.


In the presented attack, it was possible to take control of the victims’ account, it was possible due to incorrect settings of DNS servers. The person who was logged in to the Origin account after clicking on a forged link was redirected to the subpage, where login details needed to be provided as well as other data, such as credit card number. The site did not raise suspicions due to the fact that it was located on the ea.com subdomain.


On the CyberInt channel you can see how the attack was carried out

Lost24

Unusual phishing campaign targetted at Gmail users.


Niebezpiecznik warns its readers of a rather insidious form of phishing. One of the readers of the portal has received an e-mail that gives the impression of security warning sent out by Google’s internal mechanisms.


The message informs the user that he has attempted to log into his account from abroad and asks for confirmation or denial of the suspicious login on the user account.


According to Niebezpiecznik under the included Yes, it’s me / No it’s not me buttons may contain links to malicious software download or phishing message in which the victim is prompted to re-authenticate or change the password as pa

Lost24

Facebook’s cryptocurrency has yet to be released but network has already seen first batch of fake Libra’s.


Cybercriminals even went as far as creating the Libra’s calìbra.com website, but instead of the letter “I” there is the Italian accented “ì”. According to Chip’s website the site has been registered in Russia.


If any Internet user gets tempted to purchase Libra’s in “pre-order”, he or she can only lose money.
According to Facebook, the first real products utilizing Libra will be available in Messenger and WhatsApp in 2020, users will be able to send, receive and store their capital.



Lost24

A new spam campaign has been launched and its targeting Play customers. The content of the e-mail is inconspicuous, there is only information on sending the invoice, which is included in the attachment, along with invoice number and the date of the issue, as well as client’s ID.


The content of the e-mail:


Play for companies


Good morning,
we send the invoice, which you will find in the attachment. Below we present a summary of it.

Invoice number: F / 10407696/06/19
Date of issue: 18/06/2019
Customer account number: 13414991

Thank you for using our services,
Play team


Lost24

Experts from ESET warn against e-mails in which cybercriminals are impersonating the Internal Revenue Service. The malicious file VBS / TrojanDownloader.Agent.RKY is attached to the e-mail.


In the message, the victim is informed about the intention to initiate fiscal control. In addition, the content of the e-mail is written so it encourages the user to open the attachment, due to the fact that it allegedly contains a list of documents needed to carry out fiscal control.


Opening the attachment results in infection of the victim’s device with the Danabot banking Trojan, thanks to which cybercriminals are able to acquire logins and intercept passwords for bank accounts. This is possible due to the fact tha

Lost24

National Police Headquarters has issued a message in which it warns against opening fraudulent e-mails in which cybercriminals impersonate the police.


The police has learned about the whole matter from concerned citizens that started to receive messages from skarbowa@polica.pl on their mailboxes. The file with the “notice” is attached to the message. In the body of the message, the victim is asked to read the content of the notice, which contains the date of the interrogation in the nearest police station in connection with fraudulent e-mails.


Opening the attachment may cause the device to become infected with malware. Police emphasizes in the issued statement that they never send any links to sites or

Saturday 15 June 2019, Safety Guide

HiddenWasp virus attacks Linux

Lost24

The HiddenWasp virus detected by security experts from Intezer Labs is currently attacking the most secure operating system that is Linux.


HiddenWasp behaves like a Trojan and is not detected by antivirus software. When the device is infected it takes control over it by sending and downloading files, as well as running Linux terminal commands.


According to the experts from Intezer Labs, the virus was probably written in China, due to the fact that Trojan communicates with servers operating in the Hong Kong region. In addition, it appears that HiddenWasp was created originally for espionage purposes.



Lost24

Fraudsters impersonating the T-Mobile network encourage the victims to partake in a survey in which they can win a smartphone. The survey concerns only “selected” group of people, in addition the time to complete the survey is also limited.


T-Mobile’s Technical Security Department is working on blacklisting the domains that mediate in criminal activities. The operator warns people to pay attention to the short decision-making time, which is usually around 1 minute.




Lost24

Experts from Cyberus Technology have revealed another vulnerability of Intel CPU’s from the Core and Xeon families. After software patched Meltdown and Spectre vulnerabilities, Intel CPU’s are exposed to new vectors of attack in form of ZombieLoad, RIDL and Fallout.


According to the experts, ZombieLoad attack restores the browsing history and other sensitive data but also allows the leakage of information from other applications or the operating system. As the expert from Cyberus Technology explains in an interview with Chip portal, ZombieLoad gives malicious application an ability to read the memory of another app running on the same PC or server. As the experts points out, this threat is particularly dangerous for cloud services, as many

Lost24

Microsoft has detected a vulnerability in BLE (Bluetooth Low Energy) version of Titan Security Keys. Due to a high risk of attack, Google has offered free replacements of T1 or T2 variants of units.
The vulnerability is related to improper configuration of Bluetooth pairing protocols, and results in a person in near vicinity of the potential victim being able to easily access the key or the device with which it is paired.


The distance that allows for the attack is just over 9 meters. The attack can place in two ways:
-    When logging in to the account, as at this point users is asked to press a button on the BLE security key for activation purposes. During this stage, third party can conne