article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.

Malware 76
article thumbnail

Justice Department has charged a Latvian woman it says helped develop Trickbot malware

The Verge

The US Department of Justice has charged a Latvian woman for her role in allegedly developing the Trickbot malware, which was responsible for infecting millions of computers, targeting schools, hospitals, public utilities, and governments, the agency said in a news release. Illustration by Alex Castro / The Verge.

Malware 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Social Engineering 2.0: The Rise of Deepfake Phishing

SecureWorld News

And one of the most successful and increasingly prevalent ways of attack has come from social engineering, which is when criminals manipulate humans directly to gain access to confidential information. Social engineering is more sophisticated than ever, and its most advanced iteration is the topic of today's discussion: deepfakes.

article thumbnail

Google warns of ‘novel social engineering method’ used to hack security researchers

The Verge

Government-backed hackers based in North Korea are targeting individual security researchers through a number of means including a “novel social engineering method,” Google’s Threat Analysis Group is reporting. Illustration by Alex Castro / The Verge. Hackers set up a network of Twitter accounts and a cybersecurity blog.

Research 127
article thumbnail

Iranian Cyber Ops Used Facebook to Spy on U.S. Targets

SecureWorld News

Now you can add this one: nation-state cyber actors using the platform to distribute malware and conduct espionage operations. This group used various malicious tactics to identify its targets and infect their devices with malware to enable espionage.". They are as follows: Social engineering. "In Privacy violations?

Malware 96
article thumbnail

‘Sideloading is a cyber criminal’s best friend,’ according to Apple’s software chief

The Verge

“Sideloading is a cyber criminal’s best friend and requiring that on iPhone would be a gold rush for the malware industry,” according to Apple senior vice president Craig Federighi, who delivered a dramatic speech at Web Summit 2021 declaiming the security risks if Apple were required to let users sideload apps.

Software 144
article thumbnail

Google Cloud’s Cybersecurity Trends to Watch in 2024 Include Generative AI-Based Attacks

Tech Republic Big Data

A November report from Google Cloud details possible nation-state malware tactics in 2024 and new angles of cyberattacks.

Google 135