Skip Navigation

Critical Infrastructure News

Fake Black Friday apps look to steal consumer details

As many as one in 25 Black Friday apps could be fakes looking to steal logins and credit card information according to a new report.

Digital threat management company RiskIQ has used internet reconnaissance and analytics to identify digital threats against the top five eCommerce brands during the Black Friday shopping season.

It finds that more than 32,000 malicious mobile apps are using the branding of the top-five online retailers. These apps seek to trick shoppers into entering credit card information, giving up Facebook and Gmail credentials, or downloading malware that steals personal information or locks devices until ransoms are paid.

Malicious apps represent four percent of the 4,356 (one in 25) total Black Friday-themed apps available in app stores. Each of the top five brands has at least 15 malicious apps that use their name and branding alongside the term 'Black Friday.'

The top-five retail brands leading in eCommerce also have a combined total of more than 1,451 blacklisted URLs that contain their branded terms as well as 'Black Friday' and are linked to spam, malware, or phishing.

With consumer spending over the Black Friday weekend expected to be up by 47 percent compared to last year, this is clearly an attractive target for cyber criminals. In order to protect yourself RiskIQ recommends only downloading from official app stores, and being wary of apps that ask for lots of permissions like access to contacts and text messages.

You can read more about the findings and find more tips for staying safe in the full report available from the RiskIQ site.

Ransomware_Generic

Tennessee city still not recovered from ransomware attack

The City of Spring Hill, Tenn. is still suffering from the effects of a ransomware attack that struck the municipality in early November when government officials refused to pay the $250,000 ransom demanded by the cybercriminals.

The attack has essentially stopped the city from being able to conduct many of its usual functions as its IT department attempts to rebuild the database from backed up files.   The attack has locked city workers out of their email accounts, and residents are unable to make online payments, use payment cards to pay utility bills and court fines, or conduct any other business transaction. Instead, the city is asking that payments be made by check, and then either dropped off or mailed.

One after effect this has had is people are now forced to line up outside city hall to take care of their business, but on a more severe note the attack has also forced emergency dispatchers to log 911 calls by hand on a whiteboard, according to WKRN, and has shut down all mobile data terminals in the city's police cars. City officials told WKRN that all emergency services are still being provided.

The 911 and city email systems were first in line to be restored starting this week. No information is believed to have been removed from the city's server by the attackers.