Difference between revisions of "Anomali Threat Research Identifies Fake COVID-19 Contact Tracing Apps Used to Download Malware that Monitors Devices, Steals Personal Data (Q4745)"

From Wikibase Personal data
Jump to navigation Jump to search
(‎Created claim: concerns (P110): CoronApp (Q4714))
(‎Created claim: quote (P203): Threat actors continue to imitate official apps to take advantage of the brand recognition and perceived trust of those released by government agencies. [..]. This research reveals a glimpse into some of the applications threat actors are actively distributing, and there are likely numerous others in the wild that have not yet been detected.)
 
(One intermediate revision by the same user not shown)
Property / date
 +
10 June 2020
Timestamp+2020-06-10T00:00:00Z
Timezone+00:00
CalendarGregorian
Precision1 day
Before0
After0
Property / date: 10 June 2020 / rank
 +
Normal rank
Property / quote
 +
Threat actors continue to imitate official apps to take advantage of the brand recognition and perceived trust of those released by government agencies. [..]. This research reveals a glimpse into some of the applications threat actors are actively distributing, and there are likely numerous others in the wild that have not yet been detected.
Property / quote: Threat actors continue to imitate official apps to take advantage of the brand recognition and perceived trust of those released by government agencies. [..]. This research reveals a glimpse into some of the applications threat actors are actively distributing, and there are likely numerous others in the wild that have not yet been detected. / rank
 +
Normal rank

Latest revision as of 07:51, 11 June 2020

Anomali's report published in June 2020
Language Label Description Also known as
English
Anomali Threat Research Identifies Fake COVID-19 Contact Tracing Apps Used to Download Malware that Monitors Devices, Steals Personal Data
Anomali's report published in June 2020

    Statements

    0 references
    0 references
    0 references
    0 references
    10 June 2020
    0 references
    Threat actors continue to imitate official apps to take advantage of the brand recognition and perceived trust of those released by government agencies. [..]. This research reveals a glimpse into some of the applications threat actors are actively distributing, and there are likely numerous others in the wild that have not yet been detected.
    0 references