Czech banks are under Malware attack again. To be more specific, their clients are. Using the already proven strategy, a Trojan horse called Android/Spy.Banker.AKJ delivers malicious payload using a trojanized application called Blockers Call 2019. The goal of this malware is to trick the user and perform a fraudulent transaction on their behalf. Ten-thousand Users […]
Over the last 2 months a massive growth of banking trojans was identified and reported by multiple security research resources. Banking trojans, such as Zeus, Ramnit and Trickbot, are among the top ten most popular banking malware families that are used to steal money from users’ accounts lately. Once installed on a victim’s computer, they are able to […]
What weapons digital payment cyberfraudsters have prepared for 2016 and won’t hesistate to use. How to prepare your battleground to have a good sleep….
The world is changing fast, the digital economy is growing and the number of digital payments is increasing. We at ThreatMark successfully managed to solve many fraudulent cyber attacks in 2015. We also found unweaponized / piloted threats that will emerge in large scale in 2016 against selected organisations and their clients. We bring […]
Your cyber protection team @ThreatMark have produced a final summary for 2015 on how the year was from the on-line payment and digital banking risk perspective. Part of the research was the modelling of fraudulent cyber scene maturity in European countries. As an addition to traditional and neXtGEN Security models, we have created this model […]
Public relations and press relations are often an important part of bank cybersecurity protection strategy. While having one finger on the pulse of current attacks, we keep another finger on the press’s reflection of what we see on the front line. We have done research in all European countries of press articles about cyber threats […]
ThreatMark media research covering more than 400 press articles across all European countries has revealed that Phishing is the most mentioned and discussed ahead of other fraudulent cyberattacks such as financial malware and Remote Administration tool abuse. We are going to bring you a summary of that media research, followed by our expert opinion – […]