Read some of the most interesting and useful infosec articles we came across during the first half of October 2018. We have included an article on what to do after a breach because the majority of us will, unfortunately, need this information at some point. Also, learn about malicious code can that be used to create a cryptominer, about the GPlayed trojan that poses as Google Play and more.
For more articles, check out our #onpatrol4malware blog.
Share this post: Tweet

Let’s Pretend You’ve Been Breached. Now What?
Source: ITSP Magazine
With attacks occurring every 39 seconds, everyone gets breached sooner or later. Even organizations that have seemingly robust cyber security solutions in place aren’t immune. Learn about steps you can put in place to mitigate the damage. Read more.

Adaptable, All-in-One Android Trojan Shows the Future of Malware
Source: Threatpost
GPlayed may be the new face of malware — flexible and adaptable, with a Swiss Army knife-like toolbox that can be used to target pretty much anyone. Read more.

Recent wave of hijacked WhatsApp accounts traced back to voicemail hacking
Source: ZDNet
A wave of reports about hijacked WhatsApp accounts in Israel has forced the government’s cyber-security agency to send out a nation-wide security alert recently. Read more.

GPlayed Trojan – .Net playing with Google Market
Source IBM Security Intelligence
Cisco Talos has identified the latest attempt to penetrate mobile devices — a new Android trojan that we have dubbed “GPlayed.” This is an extremely flexible trojan, making it a very effective tool for malicious actors. Read more.

Source: McAfee
VORACLE, a recently discovered vulnerability that was announced at a security conference by security researcher Ahamad Nafeez, is making some people reconsider using a VPN. Read more.

Source: Sucuri Blog
Dig into an encrypted malicious code to discover how an a piece of heavily obfuscated JavaScript malware can create a cryptominer. Read more.