Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Source Code of GMBot Thrown Open Online

Android users require remaining vigilant about an expected hike in malware assaults ever-since an enormously customizable as well as adjustable exploit toolkit called GMBot had its source code exposed on the grey Web. Ibtimes.co.uk posted this, February 22, 2016.

One kind of mobile malware, GMBot surfaced during late-2014 within Russia's cyber-world underground. Even with having many pseudonyms -Acecard, Bankosy, SlemBunk, MazarBot and Slempo- the bot has been notoriously active amongst cyber-criminals as it proved a very effective spyware tool and banker Trojan. Not surprisingly therefore IBM labeled it Android attacks' 'one-stop shop.'

Cyber-intelligence specialist Limor Kessem from IBM Trusteer team states that the source code doesn't just mean that cyber-attackers enjoy the code's access devoid of paying a subscription fee or price for purchase, however, far worse, there's a server-side instruction guide and tutorial included in the code.

Reportedly, the software executes 'overlay screens' covering applications so as for duping end-users into typing personal usernames/passwords that subsequently get dispatched onto the attackers' server elsewhere. Currently, according to IBM, GMBot can be easily accessed for recompiling its code, crafting fresh samples as well as utilizing the leaked code for constructing, deploying else selling the malware to execute fraudulent operations by paying a mere $500 (353 pounds).

Occasionally cyber-criminals construct their own malware scripts; however, usually exploit kits and malware packages are available for purchase on the Internet by paying a once-for-all fee alternatively, periodical subscriptions that as well enable users towards accessing the latest versions that would provide them extra features and keep ahead of malware detection companies.

In fact, MazarBot a GMBot sample was lately discovered as actively striking Android mobiles, facilitating the perpetrators towards gaining full administrative privileges for keeping watch over and regulating almost all facets of the smart-phone. By using one malware-tainted MMS/SMS message, which when followed, the persistent and manipulative malicious program disseminates an enormous number of dangerous exploits that let it anonymously gain admission into the Web, turn the mobile gadget in sleep-mode etc. Interestingly, GMBot mayn't prove similarly profuse as the prominent banker Trojans; however, it certainly has completely changed the mobile threats scenario.

ยป SPAMfighter News - 2/29/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page