Este efectivo y poderoso Malware para dispositivos Android ha estado oculto durante años, ahora vuelve a la carga, con campañas de hacking y espionaje bien organizadas y está infectando a teléfonos inteligentes, dejando a merced el dispositivo infectado, sin que el dueño del mismo perciba cambio alguno. Recursos afectados El spyware denominado Mandrake, es un software malicioso desarrollado de forma eficiente y eficaz, solo se comprobó su existencia cuatro años después de su primera aparición. Se tiene evidencia de campañas de Mandrake, las primeras entre los años 2016 y 2017, y después campañas entre 2018 y 2020. Los lugares que más se vieron afectados por este spyware fueron Norte América, algunos países de Sur América como: Brasil y Argentina, Europa, Asia, y con mayor impacto en Australia.
Según indica Google en su bloc, donde lo citamos en esta noticia, Google registra 18 millones diarios de correos con software malicioso sobre COVID-19. Enlace: Protecting businesses against cyber threats during COVID-19 and beyond The attacks we’re seeing (and blocking) Every day, Gmail blocks more than 100 million phishing emails. During the last week, we saw 18 million daily malware and phishing emails related to COVID-19. This is in addition to more than 240 million COVID-related daily spam messages. Our ML models have evolved to understand and filter these threats, and we continue to block more than 99.9% of spam, phishing, and malware from reaching our users. The phishing attacks and scams we’re seeing use both fear and financial incentives to create urgency to try to prompt users to respond. Here are some examples: Impersonating authoritative government organizations like the World Health Organization (WHO) to solicit fraudulent donations or distribute malware. This includes mechanisms to distribute downloadable files that can install backdoors. In addition to blocking these emails, we worked with the WHO to clarify the importance of an accelerated implementation of DMARC (Domain-based Message Authentication, Reporting, and Conformance) and highlighted the necessity of email authentication to improve security. DMARC makes it harder for bad actors to impersonate the who.int domain, thereby preventing malicious emails from reaching the recipient’s inbox, while making sure legitimate communication gets through. This example shows increased phishing attempts of employees operating in a work-from-home setting. Improving security with proactive capabilities We have put proactive monitoring in place for COVID-19-related malware and phishing across our systems and workflows. In many cases, these threats are not new—rather, they’re existing malware campaigns that have simply been updated to exploit the heightened attention on COVID-19. As soon as we identify a threat, we add it to the Safe Browsing API, which protects users in Chrome, Gmail, and all other integrated products. Safe Browsing helps protect over four billion devices every day by showing warnings to users when they attempt to navigate to dangerous sites or download dangerous files. In G Suite, advanced phishing and malware controls are turned on by default, ensuring that all G Suite users automatically have these proactive protections in place. These controls can: Route emails that match phishing and malware controls to a new or existing quarantine Identify emails with unusual attachment types and choose to automatically display a warning banner, send them to spam, or quarantine the messages Identify unauthenticated emails trying to spoof your domain and automatically display a warning banner, send them to spam, or quarantine the messages Protect against documents that contain malicious scripts that can harm your devices Protect against attachment file types that are uncommon for your domain Scan linked images and identify links behind shortened URLs Protect against messages where the sender’s name is a name in your G Suite directory, but the email isn’t from your company domain or domain aliases Best practices for organizations and users Admins can look at Google-recommended defenses on our advanced phishing and malware protection page, and may choose to enable the security sandbox. Users should: Complete a Security Checkup to improve your account security Avoid downloading files that you don’t recognize; instead, use Gmail’s built-in document preview Check the integrity of URLs before providing login credentials or clicking a link—fake URLs generally imitate real URLs and include additional words or domains Avoid and report phishing emails Consider enrolling in Google’s Advanced Protection Program (APP)—we’ve yet to see anyone that participates in the program be successfully phished, even if they’re repeatedly targeted At Google Cloud, we’re committed to protecting our customers from security threats of all types. We’ll keep innovating to make our security tools more helpful for users and admins and more difficult for malicious actors to circumvent.