Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Run, Jump, Shoot, Infect: Trojanized Games Invade Google Play
Newest First  |  Oldest First  |  Threaded View
User Rank: Strategist
10/19/2015 | 11:52:45 AM
Re: Who to blame?
Trojanized Games Invade many plateforms
User Rank: Apprentice
9/27/2015 | 5:34:38 PM
whom to blame
Interesting view. My view is that, there is no reason to blame anyone..
User Rank: Apprentice
9/24/2015 | 12:42:32 PM
Re: Who to blame?

Failing to clean up the site is a big negative for the site runners. They must have lost a large part of users who thinks that what if other games are also infected. These sites need to work to win back the trust of its users which is fast moving away. Google play store is a big banner and people trust its reputation. If these things can happen at their site I am afraid what will be the condidtion of the site which are not very popular. ?

User Rank: Apprentice
9/24/2015 | 12:38:24 PM
Who to blame?

Interesting. I am not sure whom to bame here. Either its the management of google play store or the user. The sufferers are eventually the end users. These kind of malicious softwares seems to be there for ever. The remidial measures are always launched after the trojan has bloomed to millions. Does it sound any alarm on wrong intentions. I am really sensing something fishy in that. Do you?

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-10-25
Akaunting v1.3.17 was discovered to contain a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Company Name input field.
PUBLISHED: 2021-10-25
In Eclipse Openj9 before version 0.29.0, the JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods.
PUBLISHED: 2021-10-25
The Special Text Boxes WordPress plugin through 5.9.109 does not sanitise or escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed.
PUBLISHED: 2021-10-25
The St-Daily-Tip WordPress plugin through 4.7 does not have any CSRF check in place when saving its 'Default Text to Display if no tips' setting, and was also lacking sanitisation as well as escaping before outputting it the page. This could allow attacker to make logged in administrators set a mali...
PUBLISHED: 2021-10-25
The Request a Quote WordPress plugin before 2.3.5 does not sanitise, validate or escape some of its settings in the admin dashboard, leading to authenticated Stored Cross-Site Scripting issues even when the unfiltered_html capability is disallowed.