Category: In The News


Joker Trojan Attacks Android Ecosystem

By Amine Mekkaoui,

More variants of the Joker Android malware are cropping up relentlessly targeting Android mobile platforms, Google Play. Zscaler have found 17 different samples of Joker being regularly uploaded during September. The Joker malware is a mobile trojan that carries out a type of billing fraud advertising themselves as legitimate apps. Once installed, they simulate clicks and intercept SMS messages to subscribe victims to unwanted, paid premium services. Recent variants exhibited some new tricks, such as the use of AES encryption, and code injection into Android’s “content provider” function.

Croyten will recommend and help you build defenses from any type of malwares. Now that more cyber attacks are coming in, it is crucial that your company stands resilient against them.

A report by NTT Ltd shows the root cause of the cybersecurity threat having substantially increased is perhaps the obsolete or aging devices. According to the report, on an average, an obsolete device has twice as many vulnerabilities per device (42.2 percent) compared to aging (26.8 per cent) and current devices (19.4 percent). These devices create security vulnerabilities and put businesses at risk of cyber attacks with people logging in from co-working spaces and remote work locations. The report suggests increase in investment in on-premises infrastructure and cloud spending.

Events like this are addressed by our company, Croyten, by reviewing your cybersecurity controls and recommending changes so that your critical system will be hard to penetrate by cyber attackers. Learn more about the services we offer.

APT28 Mounts Rapid, Large-Scale Theft of Office 365 Logins

By Amine Mekkaoui,

APT28. a Russia-linked threat group has changed up its tactics to include Office 365 password-cracking and credential-harvesting. The attacks have been aimed mainly at U.S. and U.K. organizations directly involved in political elections and have been going on since April.

Microsoft telemetry shows that the group launched credential-harvesting attacks against tens of thousands of accounts at more than 200 organizations between last September and June. 

Organizations and individuals can protect themselves by applying multi factor authentication (MFA) and actively monitoring for failed authentications for the cloud service.

Events like this are addressed by our company, Croyten, by designing your cyber systems into something that’s impenetrable by cyber attackers. Learn more about the services we offer.


A series of ransomware attacks and other cyber threats have plagued back-to-school plans.  Just last week, Hartford’s ransomware attack caused an outage of critical systems, including the school district’s software system that delivers real-time information on bus routes. The attacks include Zoom-bombing, a trend that began earlier in 2020 which occurs when a bad actor gains access to the dial-in information and “crashes” a Zoom session – often sharing adult or otherwise disturbing content. As students prepare to return to school virtually, school districts should prepare and step up their security in battling these virtual classroom hijacking attacks.

To further learn about Ransomware you can check our full article on the said topic at {insert link}. If you need IT solutions or assistance with your cyber security, feel free to check out our company, Croyten.

Remote Workers: At-Risk for Cyber Attacks

By Amine Mekkaoui,

Recently, a cyber attack on Twitter took place when a 17 year old hacker posed as a trusted colleague and tricked a Twitter employee into sharing user credentials by using basic hacking techniques. The hacker was then able to spoof the Twitter employee’s phone number through SIM swapping obtaining personal information and intercepted the one-time passwords (OTPs) used for multi-factor authentication (MFA) and quickly elevated his privileges inside the company.

With so many businesses shifting to remote work, the days of the IT-controlled security perimeter are long gone. Cybercriminals are fully aware of the mass work-from-home shift, and they’re crafting their attacks accordingly. If things like this can exist in big companies like Twitter, it could like work in yours too.

If you want to strengthen the security of your organization’s cyber system and have employees that are cyber-competent, it might be interesting for you to check out our company, Croyten. We specialize in IT solutions and cybersecurity.

WhatsApp Commits To More Transparency About App Flaws

By Amine Mekkaoui,

WhatsApp update flaws

Facebook-owned WhatsApp has fixed six previously undisclosed vulnerabilities in its chat platform. Some of the bugs were:

1) a URL-validation issue that caused the recipient of a sticker message containing deliberately malformed data to load an image from a sender-controlled URL without user interaction; and

2) an input-validation issue that could have allowed cross-site scripting if a user clicked on a link from a specially-crafted live location message. WhatsApp have patched these bugs as soon as they were discovered, and said that they will keep “with industry best practices” and conduct “necessary fixes”.

Reference: https://threatpost.com/whatsapp-discloses-6-bugs-dedicated-security-site/158962/