Saturday, November 4, 2017

Don’t Click! ‘WhatsApp Color Change’ Link On WhatsApp Is A Malware; People Report Data Loss


.
If you are regular on Whatsapp, by now you might have received the text from someone or on a group claiming that how clicking on a link would enable the option to change the colour of your Whatsapp application.

Surprisingly the link went viral, where the endorser is asking the clicker to share the link to different other groups and contacts, which will finally enable the option of choosing your favourite color for your Whatsapp application. The link is nothing, but a malware luring users to click on it and tricking them to share it with others and generate more buzz.

It has been doing multiple rounds on the social media now and also on WhatsApp, where it originally originated.

There are several other such malicious links available on the internet which tricks users with such appealing features and lure them to install malware on their devices. Though such links don’t spread on such a wide basis, as most of them are short-lived and soon get taken down by cyber security controllers.

This color changing link came out to be an exception and it got viral in a fortnight. They claim to change the color of your WhatsApp, though when you click, it only installs an unknown adware on your device.

Though when you finally share the link with your contacts and groups, their next pop up shows a message, which says that the different color can only be used on a computer, where your device needs to have Chrome as your browser and you should add the required extension.



The malicious link will redirect you to a website named www.blackwhats.site, which is basically a suspicious adware based site. There have been reports of data loss, as clicking on such links lead to straight transmission of malware to your device, which makes the device easily vulnerable to any kind of attack.

WhatsApp-scam-message

How to Keep Your Device Safe from such Malicious Elements?
It’s a very basic thing that WhatsApp hasn’t got that much time to send you texts to invite you to update their platform. Anyone who has been around the internet for some time, know that the link is fake, but still how they trick and lure people as it seems very much convincing at the beginning.

Do not click on any kind of unknown or suspicious link.
Whatsapp will not send out any kind of text message in case there is an update.
Do not forward any such kind of spam texts, which attracts unnecessary attention.
Keep your smartphone safe with a reliable antivirus, which can shield the device from any such attack.

It’s better to stay away from such spam texts and refrain yourself from sharing such messages.

How to Avoid Accidental Data Loss?

Whatsapp has got all the important texts, information, pictures and data. The platform is one of the most used platforms around the world to communicate and share data, which makes all the data on the app really important.

Any kind of Data Loss can be a big disaster for anyone. Such malicious links sometimes lead to data loss, where even personal data isn’t even spared. To prevent such accidental data loss, the best resort is to keep the Everyday Data Backup option on, and keeping an everyday backup of your important data. This can safeguard all your data, where you can make sure your data is safe and secure.
.
Source:http://trak.in/tags/business/2017/05/17/whatsapp-color-change-scam-malware/

Friday, November 3, 2017

Biggest mobile data breach in Malaysia - 46.2 million mobile number subscribers affected


.
PETALING JAYA: The personal details of some 46.2 million mobile number subscribers in Malaysia are at stake in what is believed to be one of the largest data breaches ever seen in the country.
From home addresses and MyKad numbers to SIM card information, the private details of almost the entire population may have fallen into the wrong hands.
Malaysia’s population is only around 32 million, but many have several mobile numbers. The list is also believed to include inactive numbers and temporary ones bought by visiting foreigners.
With this leak, Malaysians may be vulnerable to social engineering attacks and in a worst-case scenario, phones may be cloned.
The leak of the mobile data was reported earlier this month on online forum and news site lowyat.net, which reported that it was thought to originate from a massive data breach in 2014.
Yesterday, the site “confirmed” that 46.2 million mobile numbers were leaked online.
Lowyat.net founder Vijandren Ramadass told The Star that all information it received on the matter was handed over to the Malaysian Communications and Multimedia Commission (MCMC).
Asked what sort of action would be needed, he said: “Telcos need to admit that this breach actually happened and should inform all their customers what should be done.”
It is believed that the MCMC and police are collaborating on the investigation.
Network and security strategist Gavin Chow said the most common social engineering attack examples were phone and messaging scams.
“Scammers pretend to be someone calling or texting from the telco since they can prove they have the target’s personal details,” said Chow, who is with cybersecurity and malware protection company Fortinet.
He added that the scammers would then try to trick the victim in various ways.
These include transferring funds into their accounts and installing “telco applications” containing malware or spyware, which will be used to exploit the target in future.
“The devices would likely not be hacked directly, but anyone with the data dump information and a little creativity may convince unsuspecting victims to install malware on their devices.
“Users need to be alert when receiving calls and messages from strangers. Do not get tricked into sharing more personal details, transferring funds or installing apps,” he said.
Technology strategist Dinesh Nair said there was not much that consumers could do, but they should change their SIM card, for starters.
“Your name, address, phone number, the IMSI (international mobile subscriber identity) and the IMEI (international Mobile Equipment Identity), which are tied to your device are all out there.
“I’m sure my data is there as well. People with really good technical skills will be able to clone someone’s phone and that’s the worst-case scenario,” he said.
Dinesh added that while no one knew where the breach occurred, the fact that the details were out there pointed to a leak of some sort.
“How it happened, we can’t tell but with so much released from different telcos at the same time, it must come from a single source,” he added.
Bar Council cyber law and information technology committee co-chairman Foong Cheng Leong said assuming that the leak was after the enforcement of the Personal Data Protection Act 2010, there might have been a breach of the Act’s Security Principle by the data users.
“The Security Principle requires data users to process personal data securely, but there is not much customers can do other than file a complaint with the Personal Data Protection Commissioner,” he said.
Digi said in a statement that it prioritised the privacy of its customer data.
“The authorities are looking into the matter and we’ll continue to support them,” the statement read.
Celcom Axiata Bhd said it was “collaborating closely with the authorities to assist in the investigation”, a sentiment echoed by Maxis Bhd, which also said it “fully supports the investigation”.
Representatives from U Mobile declined to speak about the leak, while representatives of TuneTalk could not be contacted for comments at press time.
MMA president Dr Ravindran R. Naidu said a police report was lodged more than a week ago when news of the leak surfaced.
“Of course, no system is unhackable. Even the US Department of Defence has been hacked.
“However, we have been in the process of upgrading our IT system for the last year or so and the new servers will be more secure.
“We will also be upgrading our operational security measures and introducing a new SOP for our staff to minimise the risk of a repeat of this episode,” he said.

Read more at http://www.thestar.com.my/news/nation/2017/10/31/msia-sees-biggest-mobile-data-breach-over-46-million-subscribed-numbers-at-risk-from-scam-attacks-an/#EGmXMGglpZ7ZPQf7.99

.

Flash Installer Adware - Be very careful what you agree to install


.
The “Please install Flash Player Update (Recommended)” pop-up ad is a social engineering technique, which is to trick Windows users to install adware or a potentially unwanted program on their computers.

The “Please install Flash Player Update (Recommended)” pop-ups happens regardless of the web browser or search engine, and if you are seeing a pop-up from a website saying that a “Please install Flash Player Update (Recommended)” is required, then your computer may be infected with adware or a potentially unwanted program.

This infection is designed specifically to make money. It generates web traffic, collects sales leads for other dubious sites, and will display advertisements and sponsored links within your web browser.

The “Please install Flash Player Update (Recommended)” ad is distributed via adware or other malicious programs. Malicious websites, or legitimate websites that have been compromised, may display this pop-up ads within your web browser.

On these infected or compromised websites, cyber criminals will display a pop-up box stating that you need to updated or install a piece of software.The text for the “Please install Flash Player Update (Recommended)”pop-up is:

Flash Player is needed
Please install Flash Player Update (Recommended)

If you click on the “Download” or “Click to install now” button, instead of installing an update, you’ll agree to download an adware or a malicious programs onto your computer.
The “Please install Flash Player Update (Recommended)” link may install on your computer potentially unwanted programs like: toolbars (Sweet-Page Toolbar, AwesomeHP Toolbar), adware (EnhanceTronic, Feven 1.8, CouponBuddy) or other forms of malware.

You should always pay attention when installing software because often, a software installer includes optional installs, such as this “Please install Flash Player Update (Recommended)” adware. Be very careful what you agree to install.

Always opt for the custom installation and deselect anything that is not familiar, especially optional software that you never wanted to download and install in the first place. It goes without saying that you should not install software that you don’t trust.
.