Difference between revisions of "Anomali Threat Research Identifies Fake COVID-19 Contact Tracing Apps Used to Download Malware that Monitors Devices, Steals Personal Data (Q4745)"

From Wikibase Personal data
Jump to navigation Jump to search
(‎Created claim: date (P100): 10 June 2020)
(‎Created claim: quote (P203): Threat actors continue to imitate official apps to take advantage of the brand recognition and perceived trust of those released by government agencies. [..]. This research reveals a glimpse into some of the applications threat actors are actively distributing, and there are likely numerous others in the wild that have not yet been detected.)
 
Property / quote
 +
Threat actors continue to imitate official apps to take advantage of the brand recognition and perceived trust of those released by government agencies. [..]. This research reveals a glimpse into some of the applications threat actors are actively distributing, and there are likely numerous others in the wild that have not yet been detected.
Property / quote: Threat actors continue to imitate official apps to take advantage of the brand recognition and perceived trust of those released by government agencies. [..]. This research reveals a glimpse into some of the applications threat actors are actively distributing, and there are likely numerous others in the wild that have not yet been detected. / rank
 +
Normal rank

Latest revision as of 07:51, 11 June 2020

Anomali's report published in June 2020
Language Label Description Also known as
English
Anomali Threat Research Identifies Fake COVID-19 Contact Tracing Apps Used to Download Malware that Monitors Devices, Steals Personal Data
Anomali's report published in June 2020

    Statements

    0 references
    0 references
    0 references
    0 references
    10 June 2020
    0 references
    Threat actors continue to imitate official apps to take advantage of the brand recognition and perceived trust of those released by government agencies. [..]. This research reveals a glimpse into some of the applications threat actors are actively distributing, and there are likely numerous others in the wild that have not yet been detected.
    0 references