This week, a large-scale Android malware campaign affecting millions of devices, a malvertising attack infecting over a million users, and the emergence of weaponised Go packages targeting Linux and macOS.
Millions of Android-powered devices, including TV streaming boxes, tablets, and car infotainment systems. Cyber security researchers at Human Security revealed that a large number of these devices are preloaded with malware that covertly turns them into botnet nodes—allowing cybercriminals to commit ad fraud, data theft, and other online crimes without the owners’ knowledge.
The latest campaign, Badbox 2.0, builds on previous findings, showing that the ecosystem behind these compromised devices is far larger than initially believed.
Avoid Low-Cost, No-Name Android Devices – Be cautious when purchasing inexpensive Android-powered gadgets, as they may come pre-infected.
Verify App Authenticity – Only download apps from official app stores, such as Google Play, and check developer credentials.
Monitor Network Traffic – Businesses should implement monitoring tools to detect unusual traffic patterns from connected devices.
Use Security Solutions – Install endpoint protection software to detect and remove suspicious applications.
Microsoft has disclosed details of a large-scale malvertising campaign that has impacted over one million devices globally. This opportunistic attack is designed to steal sensitive information from affected systems.
Avoid Untrusted Websites – Do not visit illegal streaming or torrent sites that commonly distribute malvertising.
Use Ad Blockers – Deploy ad-blocking software to mitigate exposure to harmful ads.
Regularly Update Software – Ensure browsers, antivirus, and operating systems are fully patched to prevent exploitation.
There is an ongoing malicious campaign targeting the Go programming language ecosystem. Attackers have introduced seven typosquatted packages designed to install hidden loader malware on Linux and macOS systems.
Verify Dependencies – Always double-check package sources before integrating them into projects.
Conduct Code Reviews – Regularly audit dependencies for suspicious code.
Utilise Security Tools – Implement security scanners to detect tampered or malicious packages.
Stay ahead of emerging cyber threats with real-time insights from Periculo’s Weekly Threat Feed. Our updates provide you with critical information on the latest vulnerabilities, attacks, and security trends—all designed to help you protect your business and make informed decisions.