Here are a few of our favorite infosec articles from the past few weeks. Learn about Android botnet “Black Rose Lucy” and about “BlueBorne”, which exploits Bluetooth vulnerabilities. Read how the Necurs Botnet, DarkHydrus and other threat actors are turning to inconspicuous files to peddle malspam.
For more articles, check out our #onpatrol4malware blog.

New Android Botnet Pops Up on Malware-as-a-Service Market
Source: Security Boulevard
Security researchers have discovered a new Android botnet toolkit, dubbed Black Rose Lucy by researchers from security firm Check Point Software Technologies, that is being developed as a malware-as-a-service (MaaS) offering for other cybercriminals. Read more.

Threat Actors Eyeing IQY Files To Peddle Malspam
Source: Threatpost
Researchers at IBM X-Force this week disclosed that both the Necurs Botnet, as well as DarkHydrus and the threat actor behind the Marap downloader, have all been observed utilizing weaponized IQY file attachments to deliver malware. Read more.

Bad Actors Sizing Up Systems Via Lightweight Recon Malware
Source: Threatpost
Well-known financial crime gang Cobalt Group and other threat actors have recently shifted tactics to incorporate lightweight modular downloaders that “vet” target machines for their attractiveness before proceeding with a full-fledged attack. Read more.

The many faces of omnichannel fraud
Source: Malwarebytes
The rise of new technologies, social networks, and other means of online communication have brought about compelling changes in industries across the board. Most organizations do not have adequate tools and measures in place to protect their businesses against fraud in the omnichannel environment. Read more.