Cybercriminals exploit TV shows to spread malware

Game of Thrones, The Walking Dead and Arrow are the most used by hackers. What are they doing?

Kaspersky Lab analysts have found that cybercriminals are using new episodes of their favourite TV shows to spread malware. These findings bring a new report - Game of Threats: How cybercriminals exploit television shows to spread malware.

Stolen digital identities - hackers have users doubles in their hands

Kaspersky Lab experts have discovered the Genesis hacking marketplace, an e-shop that offers more than 60,000 stolen digital identities.

This makes it much easier for hackers to misuse credit cards. In the hands of the attackers, digital identity, along with other malicious tools, allows the defense mechanisms of banks based on machine learning to work around unique user profiles, devices, and behavioral characteristics.

Malware report: Hackers target mobile online banking

There is an increasing number of malware that steals login credentials and money from bank accounts.

Kaspersky Lab experts noted a worrying increase in malware that steals login information and bank account money. In the first quarter of this year, the number of files infected with this malware increased to 29,841 (18,501 in the previous quarter). Overall, experts have seen attacks on more than 300,000 users, according to the IT Threats Report in the first quarter of 2019.

The number of users whose passwords have been stolen increases

Malware programmed to steal users' digital data, the so-called password stealer, has seen a huge rise this year.

According to Kaspersky data, the number of users infected with this malware has grown from less than 600,000 last year to more than 940,000.

Beware of fake emails confirming unsubscribe

Have you received an email to confirm the cancellation of your subscription? Be careful.

Security experts highlighted a long-term fraudulent mail campaign. Emails that look like legitimate messages to confirm unsubscribe from a service are used by attackers to collect and validate functional and active addresses - which they continue to misuse for other types of scams.