Remove 08
Remove 2012 Remove Manufacturing Remove Presentation Remove Security
article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

” “At present, pre-installed partners cover the entire mobile phone industry chain, including mobile phone chip manufacturers, mobile phone design companies, mobile phone brand manufacturers, mobile phone agents, mobile terminal stores and major e-commerce platforms,” reads a descriptive blurb about the company.

Cloud 252
article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

” “At present, pre-installed partners cover the entire mobile phone industry chain, including mobile phone chip manufacturers, mobile phone design companies, mobile phone brand manufacturers, mobile phone agents, mobile terminal stores and major e-commerce platforms,” reads a descriptive blurb about the company.

Cloud 168
article thumbnail

Outlaw is Back, a New Crypto-Botnet Targets European Organizations

Security Affairs

Based on our findings, there are some similarities in both techniques and architectures with another cybercrime group, which appeared in the wild around 2012, most probably Romanian. Figure 19: Distribution of unique IP addresses present in the downloaded list. Technical Analysis. The “a” Folder. The first folder to analyze is “a”.

Mining 131