<?xml version="1.0"?>
<rss version="2.0"><channel><title>All the news</title><link>https://news.drweb.com/news/</link><description>Doctor Web news - All the news</description><image><url>https://st.drweb.com/static/drweb_logo_en.gif</url><link>https://news.drweb.com/news/</link><title>Dr.Web anti-virus</title></image><item><guid>https://news.drweb.com/show/?i=14168&amp;lng=en</guid><title>Numerous threats on Google Play and other events in Doctor Web's February 2021 mobile malware activity review</title><link>https://news.drweb.com/show/?i=14168&amp;lng=en&amp;c=5</link><pubDate>Wed, 17 Mar 2021 11:26:34 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;March 17, 2021&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;
  &lt;strong&gt;
    &lt;newslead&gt;Doctor Web presents its February 2021 mobile malware activity overview. Last month, trojans displaying ads and malicious applications capable of executing arbitrary code and downloading other software were among most common threats once again.&lt;/newslead&gt;
  &lt;/strong&gt;
&lt;/p&gt;
&lt;p&gt;Doctor Web specialists also discovered a large number of threats on Google Play. Trojans used in various fraudulent schemes, as well as multifunctional and adware trojans were among them. Read more about these and other events in our February review.&lt;/p&gt;
&lt;p class="alignCenter"&gt;&lt;a href="http://news.drweb.com/show/review/?i=14167" class="Btn Btn_big bg_main_green_5"&gt;&lt;span class="Btn-body icon icon_right" data-icon="#common-arrowRight"&gt;&lt;span class="Btn-text"&gt;Go to the review&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
</description></item><item><guid>https://news.drweb.com/show/?i=14167&amp;lng=en</guid><title>Doctor Web’s February 2021 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=14167&amp;lng=en&amp;c=5</link><pubDate>Wed, 17 Mar 2021 11:29:44 GMT</pubDate><description>


&lt;p&gt;&lt;b&gt;March 17, 2021&lt;/b&gt;&lt;/p&gt;
&lt;p id="main"&gt;In February, malicious and unwanted programs displaying ads and trojans executing arbitrary code and downloading various apps without users’ awareness were detected most often by Dr.Web anti-virus products for Android.&lt;/p&gt;
&lt;p&gt;Throughout the last month, Doctor Web’s malware analysts uncovered more threats on Google Play. Numerous fraudulent applications from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family, multifunctional &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt; trojans, &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; adware trojans and other dangerous programs were among them.&lt;/p&gt;

&lt;div class="paddXM paddYM bg_ocean_1 white"&gt;
&lt;h4 class="white alignCenter"&gt;PRINCIPAL TRENDS IN FEBRUARY&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;New malware discovered on Google Play&lt;/li&gt;
&lt;li&gt;Malicious Android apps are actively used in various scam schemes&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h2 id="stat"&gt;According to statistics collected by Dr.Web for Android&lt;/h2&gt;
&lt;p class="alignCenter"&gt;&lt;a href="https://st.drweb.com/static/new-www/news/2021/march/01_February_malware_2021_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/01_February_malware_2021_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;.1994&lt;/dt&gt;
  &lt;dd&gt;A trojan designed to display obnoxious ads, distributed as popular applications. In some cases, it can be installed in the system directory by other malware.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.RemoteCode&amp;lng=en"&gt;&lt;b&gt;Android.RemoteCode&lt;/b&gt;&lt;/a&gt;.284.origin&lt;/dt&gt;
  &lt;dd&gt;A malicious application that downloads and executes arbitrary code. Depending on its modification, it can load various websites, open web links, click on advertising banners, subscribe users to premium services and perform other actions.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Triada&amp;lng=en"&gt;&lt;b&gt;Android.Triada&lt;/b&gt;&lt;/a&gt;.510.origin&lt;/dt&gt;
  &lt;dd&gt;A multifunctional trojan performing various malicious actions. This malware belongs to the trojan family that infects other app processes. Some modifications of this family were found in the firmware of Android devices, which attackers implanted during manufacturing. Some of them can also exploit various vulnerabilities to gain access to protected system files and folders.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Click&amp;lng=en"&gt;&lt;b&gt;Android.Click&lt;/b&gt;&lt;/a&gt;.348.origin&lt;/dt&gt;
  &lt;dd&gt;A malicious application that loads websites, clicks on banner ads, and follows links. It can be distributed as harmless programs without arousing suspicion among users.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;.5135&lt;/dt&gt;
  &lt;dd&gt;A trojan that displays obnoxious ads. It represents a special software module that is incorporated into the applications by the developers.&lt;/dd&gt;
&lt;/dl&gt;
&lt;p class="alignCenter"&gt;&lt;a href="https://st.drweb.com/static/new-www/news/2021/march/02_February_unwanted_2021_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/02_February_unwanted_2021_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FreeAndroidSpy&amp;lng=en"&gt;&lt;b&gt;Program.FreeAndroidSpy&lt;/b&gt;&lt;/a&gt;.1.origin&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.Mrecorder&amp;lng=en"&gt;&lt;b&gt;Program.Mrecorder&lt;/b&gt;&lt;/a&gt;.1.origin &lt;/dt&gt;
  &lt;dd&gt;Software that monitors Android user activity and may serve as a tool for cyber espionage. These apps can track device locations, collect information from SMS and social media messages, copy documents, photo and video, spy on phone calls, etc.&lt;/dd&gt;
  &lt;dt&gt;Program.FakeAntiVirus.2.origin&lt;/dt&gt;
  &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of non-existing threats, mislead them and demand they purchase the full version of the software.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CreditSpy&amp;lng=en"&gt;&lt;b&gt;Program.CreditSpy&lt;/b&gt;&lt;/a&gt;.2&lt;/dt&gt;
  &lt;dd&gt;The detection name for programs designed to assign credit ratings to users based on their personal data. These applications upload SMS, contact information from phonebooks, call history and other information to the remote server.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.Gemius&amp;lng=en"&gt;&lt;b&gt;Program.Gemius&lt;/b&gt;&lt;/a&gt;.1.origin&lt;/dt&gt;
  &lt;dd&gt;An application that collects information about Android devices and how their owners are using them. With technical data, it also collects confidential information, such as device location, browser bookmarks, web history, and typed URLs.&lt;/dd&gt;
&lt;/dl&gt;
&lt;p class="alignCenter"&gt;&lt;a href="https://st.drweb.com/static/new-www/news/2021/march/03_February_riskware_2021_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/03_February_riskware_2021_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;.6.origin&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;.7.origin&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;.13.origin&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;.14.origin&lt;/dt&gt;
  &lt;dd&gt;Riskware platforms that allow applications to launch APK files without installation. They create a virtual runtime environment that does not affect the main operating system.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Obfuscapk&amp;lng=en"&gt;&lt;b&gt;Tool.Obfuscapk&lt;/b&gt;&lt;/a&gt;.1&lt;/dt&gt;
  &lt;dd&gt;The detection name for applications protected by the Obfuscapk obfuscation tool. This tool is used to automatically modify and scramble Android apps’ source code to make reverse engineering more difficult. Cybercriminals use the tool to protect malicious applications from being detected by anti-virus programs.&lt;/dd&gt;
&lt;/dl&gt;
&lt;p class="alignCenter"&gt;&lt;a href="https://st.drweb.com/static/new-www/news/2021/march/04_February_adware_2021_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/04_February_adware_2021_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Program modules incorporated into Android applications and designed to display obnoxious ads on Android devices. Depending on their family and modifications, they can display full screen ads and block other apps’ windows, show various notifications, create shortcuts and load websites.&lt;/p&gt;
&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;.36.origin&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;.6547&lt;/dt&gt;
  &lt;dt&gt;Adware.Myteam.2.origin&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Overlay&amp;lng=en"&gt;&lt;b&gt;Adware.Overlay&lt;/b&gt;&lt;/a&gt;.1.origin&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.LeadBolt&amp;lng=en"&gt;&lt;b&gt;Adware.LeadBolt&lt;/b&gt;&lt;/a&gt;.12.origin&lt;/dt&gt;
&lt;/dl&gt;
&lt;h2 id="googleplay"&gt;Threats on Google Play&lt;/h2&gt;
&lt;p&gt;Throughout January, Doctor Web’s specialists observed significant activity among the malicious applications from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family. A large number of the apps were used by cyberattackers in various fraudulent schemes. One of the trojan groups was spread as software allegedly designed to provide access to discounts, promotional and bonus cards, as well as to gifts from famous stores and companies. To make it look more appealing, the malware authors used symbols and names of corresponding brands—consumer electronics manufacturers, gas stations and retailers.&lt;/p&gt;
&lt;p class="alignCenter"&gt;&lt;a href="https://st.drweb.com/static/new-www/news/2021/march/05_Android_FakeApp.239_dev.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/05_Android_FakeApp.239_dev.1.png" alt="screen Android.FakeApp.239"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Upon their launch, these apps invited potential victims to apply for a paid subscription (starting from 449 to 1499 rubles per week) allegedly to access the complete functionality of the software and to receive promised bonuses. However, they only received useless barcodes and QR codes—the same for all trojans—with the promise of receiving notifications with new codes in the future. At the same time, only a few modifications of these programs had the functionality to work with the notifications, which alone questioned their developer’s integrity.&lt;/p&gt;
&lt;p&gt;If users agreed to make an in-app purchase, they were given a 3-day free trial so they could confirm the subscription or cancel it. The logic of the fraudulent scheme was that Android device owners will either forget about trial period or that they even installed these apps in the first place, or due to lack of experience, they would not realize they applied for a premium service with regular charges. &lt;/p&gt;
&lt;p&gt;Various modifications of these trojans were added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.239&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.240&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.246&lt;/b&gt;, and &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.247&lt;/b&gt;. Examples of how some of them operate are shown on the images below:&lt;/p&gt;

&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/06_Android_FakeApp.239_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/06_Android_FakeApp.239_1.1.png" alt="screen Android.FakeApp.239"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/06_Android_FakeApp.239_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/06_Android_FakeApp.239_2.1.png" alt="screen Android.FakeApp.239"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/06_Android_FakeApp.239_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/06_Android_FakeApp.239_3.1.png" alt="screen Android.FakeApp.239"&gt;&lt;/a&gt;
  &lt;br&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/06_Android_FakeApp.239_4.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/06_Android_FakeApp.239_4.1.png" alt="screen Android.FakeApp.239"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/06_Android_FakeApp.239_5.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/06_Android_FakeApp.239_5.1.png" alt="screen Android.FakeApp.239"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/06_Android_FakeApp.239_6.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/06_Android_FakeApp.239_6.1.png" alt="screen Android.FakeApp.239"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;Messages and code examples they displayed after a user successfully subscribed to the premium service:&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/07_Android_FakeApp.239_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/07_Android_FakeApp.239_1.1.png" alt="screen Android.FakeApp.239"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/07_Android_FakeApp.239_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/07_Android_FakeApp.239_2.1.png" alt="screen Android.FakeApp.239"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;The second group of fake programs from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family included software spread by scammers as broadly themed, harmless applications including reference software and guides about fashion, animals, nature, and various horoscopes. Their real functionality didn’t match what was indicated. They only loaded different dating and even scam websites. These apps were actively promoted through the YouTube ads network when advertising video clips and banners aggressively used adults-only content with dating and meetings topics as well. Overall, Doctor Web’s specialists uncovered more than 20 of these fake applications.&lt;/p&gt;
&lt;p&gt; Examples of these trojans distributed throughout Google Play and the ads leading to them are shown below:&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/08_Android_FakeApp.235_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/08_Android_FakeApp.235_1.1.png" alt="screen Android.FakeApp.235"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/08_Android_FakeApp.235_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/08_Android_FakeApp.235_2.1.png" alt="screen Android.FakeApp.235"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/09_Android_FakeApp_temp1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/09_Android_FakeApp_temp1.1.png" alt="screen Android.FakeApp"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/09_Android_FakeApp_temp2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/09_Android_FakeApp_temp2.1.png" alt="screen Android.FakeApp"&gt;&lt;/a&gt;
  &lt;br&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/10_Android_FakeApp.237_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/10_Android_FakeApp.237_1.1.png" alt="screen Android.FakeApp.237"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/10_Android_FakeApp.237_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/10_Android_FakeApp.237_2.1.png" alt="screen Android.FakeApp.237"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/11_Android_FakeApp.238_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/11_Android_FakeApp.238_1.1.png" alt="screen Android.FakeApp.238"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/11_Android_FakeApp.238_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/11_Android_FakeApp.238_2.1.png" alt="screen Android.FakeApp.238"&gt;&lt;/a&gt;
  &lt;br&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/12_Android_FakeApp.234_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/12_Android_FakeApp.234_1.1.png" alt="screen Android.FakeApp.234"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/12_Android_FakeApp.234_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/12_Android_FakeApp.234_2.1.png" alt="screen Android.FakeApp.234"&gt;&lt;/a&gt;  
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/13_Android_FakeApp.229_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/13_Android_FakeApp.229_1.1.png" alt="screen Android.FakeApp.229"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/13_Android_FakeApp.229_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/13_Android_FakeApp.229_2.1.png" alt="screen Android.FakeApp.229"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;The examples of websites these apps loaded:&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/14_Android_FakeApp_site_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/14_Android_FakeApp_site_1.1.png" alt="screen Android.FakeApp"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/14_Android_FakeApp_site_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/14_Android_FakeApp_site_2.1.png" alt="screen Android.FakeApp"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/14_Android_FakeApp_site_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/14_Android_FakeApp_site_3.1.png" alt="screen Android.FakeApp"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/14_Android_FakeApp_site_4.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/14_Android_FakeApp_site_4.1.png" alt="screen Android.FakeApp"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;The third group of the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; malicious apps included other variations of fraudulent trojans, which were spread under the guise of software with information about various financial compensations, social benefits and payouts. They were none other than the modifications of the well-known &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.219&lt;/b&gt; and &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.227&lt;/b&gt; malware.&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/15_Android_FakeApp.219_dev_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/15_Android_FakeApp.219_dev_1.1.png" alt="screen Android.FakeApp.219"&gt;&lt;/a&gt;
  &lt;br&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/15_Android_FakeApp.219_dev_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/15_Android_FakeApp.219_dev_2.1.png" alt="screen Android.FakeApp.219"&gt;&lt;/a&gt;
  &lt;br&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/15_Android_FakeApp.219_dev_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/15_Android_FakeApp.219_dev_3.1.png" alt="screen Android.FakeApp.219"&gt;&lt;/a&gt;
  &lt;br&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/15_Android_FakeApp.227_dev.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/15_Android_FakeApp.227_dev.1.png" alt="screen Android.FakeApp.227"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;Similar to some of the other fake apps within the same family, they were also advertized through YouTube:&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/16_Android_FakeApp.219_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/16_Android_FakeApp.219_1.1.png" alt="screen Android.FakeApp.219"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/16_Android_FakeApp.219_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/16_Android_FakeApp.219_2.1.png" alt="screen Android.FakeApp.219"&gt;&lt;/a&gt;
  &lt;br&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/16_Android_FakeApp.219_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/16_Android_FakeApp.219_3.1.png" alt="screen Android.FakeApp.219"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/16_Android_FakeApp.219_4.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/16_Android_FakeApp.219_4.1.png" alt="screen Android.FakeApp.219"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;Upon their launch, the trojans loaded fraudulent sites where potential victims could allegedly find information about payouts available to them. There, users were misled and asked to provide their personal data and either pay a money “transfer” commission or a “state duty”. In reality, there were not any payouts for users. They only released their personal details and transferred their money to the scammers.&lt;/p&gt;
&lt;p&gt;Doctor Web’s malware analysts also uncovered several new multifunctional trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt; family. As other malware from this family, they were spread as harmless apps, including image editing software, a barcode scanner, software for creating PDF documents, a collection of stickers for messaging apps, animated wallpapers and others. These trojans were dubbed &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.580&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.585&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.586&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.592&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.595&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.598&lt;/b&gt;, and &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.604&lt;/b&gt;.&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/17_Android_Joker.580.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/17_Android_Joker.580.1.png" alt="screen Android.Joker.580"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/18_Android_Joker.585.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/18_Android_Joker.585.1.png" alt="screen Android.Joker.585"&gt;&lt;/a&gt;
  &lt;br&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/19_Android_Joker.586.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/19_Android_Joker.586.1.png" alt="screen Android.Joker.586"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/20_Android_Joker.598.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/20_Android_Joker.598.1.png" alt="screen Android.Joker.598"&gt;&lt;/a&gt;
  &lt;br&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/21_Android_Joker.604.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/21_Android_Joker.604.1.png" alt="screen Android.Joker.604"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/22_Android_Joker.592.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/22_Android_Joker.592.1.png" alt="screen Android.Joker.592"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;Their main functionality was loading and executing an arbitrary, as well as automatically subscribing users to premium mobile services.&lt;/p&gt;
&lt;p&gt;Moreover, other adware trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; malware family were also discovered on Google Play. They were dubbed &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.610.origin&lt;/b&gt; and &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.2357&lt;/b&gt;. The first one was spread as an image collection app while the second one was spread as picture editing software.&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/23_Android_HiddenAds.610.origin.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/23_Android_HiddenAds.610.origin.1.png" alt="screen Android.HiddenAds.610.origin"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/24_Android_HiddenAds.2357.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/24_Android_HiddenAds.2357.1.png" alt="screen Android.HiddenAds.2357"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt; Upon launch, the trojans concealed their icons from the list of installed apps on the main screen menu and began displaying ads. With that, &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.610.origin&lt;/b&gt; received commands through the Firebase cloud service and was able to display notifications with ads and load various sites. They could be websites with ads, as well as dubious and fraudulent sites.&lt;/p&gt;
&lt;p&gt;To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web for Android.&lt;/p&gt;
&lt;!-- ANDROID_PROTECT_BLOCK_NEW --&gt;
&lt;div class="CellBlock noPadd AndroidBlockNew"&gt;
  &lt;div class="container"&gt;
      &lt;div class="-Grid_1of6 -viewM-Grid_1of1"&gt;

          &lt;div class="DecorBg" style="background-color: #4788aa;"&gt;&lt;/div&gt;

          &lt;div class="Grid Grid_span2 alignMiddle alignCenter paddYM" style="background: url(https://st.drweb.com/static/new-www/img/bg_blue_geom.1.jpg); center; background-size: cover; background-color: #4788aa;"&gt;
              &lt;img src="https://st.drweb.com/static/new-www/img/drweb_ss_blue_noBg.png" alt="Dr.Web Mobile Security"&gt;
          &lt;/div&gt;&lt;!--
              
          --&gt;&lt;div class="Grid Grid_span4 alignMiddle _viewM_paddYM"&gt;
              &lt;div class="paddLL _viewS_noPaddL"&gt;
                  &lt;h2 class="noMargY white _viewM_alignCenter"&gt;Your Android needs protection.&lt;/h2&gt;
                  &lt;h2 class="margTC noMargB white _viewM_alignCenter"&gt;Use Dr.Web&lt;/h2&gt;
                  &lt;ul class="IconList white fontM margBS _viewM_fontS"&gt;
                      &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;The first Russian anti-virus for Android&lt;/li&gt;
                      &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Over 140 million downloads—just from Google Play&lt;/li&gt;
                      &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Available free of charge for users of Dr.Web home products&lt;/li&gt;
                  &lt;/ul&gt;
                  &lt;p class="noMargY _viewM_alignCenter"&gt;
                      &lt;a href="https://f2.drweb.com/lr/?to=https%3A%2F%2Fdownload.drweb.com%2Fandroid%2F%3Flng%3Den%26from%3DANDROID_PROTECT_BLOCK_NEW" class="Btn bg_main_green_5"&gt;
                          &lt;span class="Btn-body icon icon_right" data-icon="#common-arrowRight"&gt;
                              &lt;span class="Btn-text uppercase"&gt;Free download&lt;/span&gt;
                          &lt;/span&gt;
                      &lt;/a&gt;    
                  &lt;/p&gt;
              &lt;/div&gt;
          &lt;/div&gt;

      &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;!-- ANDROID_PROTECT_BLOCK_NEW end --&gt;


</description></item><item><guid>https://news.drweb.com/show/?i=14164&amp;lng=en</guid><title>Dr.Web CureIt! updated</title><link>https://news.drweb.com/show/?i=14164&amp;lng=en&amp;c=5</link><pubDate>Tue, 16 Mar 2021 09:27:13 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;March 16, 2021&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;newslead&gt;Russian anti-virus company Doctor Web has updated its curing utility Dr.Web CureIt!&lt;/newslead&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Now Dr.Web CureIt! features the most up-to-date version of Dr.Web Anti-rootkit API (12.6.0.202102260).&lt;/p&gt;
&lt;p&gt;&lt;a href="https://free.drweb.com/cureit/?lng=en"&gt;Download Dr.Web CureIt!&lt;/a&gt;&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14163&amp;lng=en</guid><title>Long-awaited support for macOS Big Sur in Dr.Web 12.5 beta version for macOS</title><link>https://news.drweb.com/show/?i=14163&amp;lng=en&amp;c=5</link><pubDate>Tue, 16 Mar 2021 09:26:48 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;March 16, 2021&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;newslead&gt;Russian anti-virus company Doctor Web invites all users to participate in the public beta-testing of Dr.Web 12.5 for macOS. The application's modules have been redesigned to ensure Dr.Web's compatibility with macOS Big Sur.&lt;/newslead&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Recall that Apple has made dozens of its services and applications inaccessible to security software. To make Dr.Web fully operational under the new OS version, Doctor Web had to develop traffic-filtering and scanning modules for its anti-virus literally from scratch.&lt;/p&gt;
&lt;p&gt;Dr.Web 12.5 software components are installed as system extensions for macOS. As a result, to uninstall the application, each of its modules must be removed individually.&lt;/p&gt;
&lt;p&gt;The following issue has been identified and will be resolved shortly: Dr.Web firewall does not work under macOS Big Sur 11.3 beta 3.&lt;/p&gt;
&lt;p&gt;Also note that only the x64 architecture is supported for macOS Big Sur. The new Dr.Web version for macOS does not yet support ARM64.&lt;/p&gt;
&lt;p&gt;To participate in the beta-testing of Dr.Web 12.5 for macOS, please go to &lt;a href="https://beta.drweb.com/?lng=en"&gt;this page&lt;/a&gt;.&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14162&amp;lng=en</guid><title>Dr.Web Mobile Control Center for iOS updated to version 13.0.0</title><link>https://news.drweb.com/show/?i=14162&amp;lng=en&amp;c=5</link><pubDate>Thu, 11 Mar 2021 09:28:58 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;March 11, 2021&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;newslead&gt;Russian anti-virus company Doctor Web has updated its Dr.Web Mobile Control Center for iOS to version 13.0.0.&lt;/newslead&gt; The update ensures the application is compatible with Dr.Web AV-Desk 13.0 and delivers upgrades and fixes for known issues.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Changes made to the Mobile Control Center:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;Support for Dr.Web AV-Desk 13.0 has been added; &lt;/li&gt;
  &lt;li&gt;Also added was a notification instructing administrators that a web version of the application must be used to view information about hosts in system groups;&lt;/li&gt;
  &lt;li&gt;Some server error messages now provide more information;&lt;/li&gt;
  &lt;li&gt;Server connection error messages are now more specific (SocketTimeoutException, UnknownHostException); &lt;/li&gt;
  &lt;li&gt;A notification is now displayed whenever license renewal information cannot be retrieved.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Issues resolved:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;The application's main window is now displayed properly; &lt;/li&gt;
  &lt;li&gt;Errors that made it impossible to configure notifications and disable the option to collect anonymous statistics under iOS 14.4 have been fixed.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The update can be downloaded free of charge from the &lt;a href="https://itunes.apple.com/us/app/dr.web-mobile-control-center/id881780041"&gt;App Store&lt;/a&gt;.&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14161&amp;lng=en</guid><title>Dr.Web Mobile Control Center for Android updated to version 13.0.1</title><link>https://news.drweb.com/show/?i=14161&amp;lng=en&amp;c=5</link><pubDate>Thu, 11 Mar 2021 01:00:00 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;March 11, 2021&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;newslead&gt;Russian anti-virus company Doctor Web has updated its Dr.Web Mobile Control Center for Android to version 13.0.1. The update makes adjustments to the application in compliance with Google's updated user data-usage requirements and resolves known software issues.&lt;/newslead&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Changes made to the Mobile Control Center:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;The application no longer requests permission to access location data;&lt;/li&gt;
	&lt;li&gt;An issue preventing the Control Center from identifying a host's parental tariff group on the server has been resolved;&lt;/li&gt;
	&lt;li&gt;Also resolved was a defect preventing a custom message (specified by the administrator) from appearing on a protected device whose system was being restarted.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Go to &lt;a href="https://play.google.com/store/apps/details?id=com.drweb.mcc" rel="noopener noreferrer" target="_blank"&gt;Google Play&lt;/a&gt; to download the Dr.Web Mobile Control Center for Android for free and to learn about its features.&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14154&amp;lng=en</guid><title>Study of the Spyder modular backdoor for targeted attacks</title><link>https://news.drweb.com/show/?i=14154&amp;lng=en&amp;c=5</link><pubDate>Thu, 04 Mar 2021 04:00:00 GMT</pubDate><description>&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/BackDoor.Spyder.1_en.pdf" class="Btn bg_main_green_5 widthCaptcha"&gt;
    &lt;span class="Btn-body icon icon_right" data-icon="#common-arrowRight"&gt;
      &lt;span class="Btn-text"&gt;Download PDF&lt;/span&gt;
    &lt;/span&gt;
  &lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;March 4, 2021&lt;/p&gt;
&lt;p&gt;&lt;newslead&gt;&lt;strong&gt;In December 2020, the Doctor Web virus laboratory was contacted by a telecommunications company based in Central Asia after its employees discovered suspicious files on their corporate network. During the examination, our analysts extracted and studied a malicious sample, which turned out to be one of the backdoors used by the hacker group known as &lt;b&gt;Winnti&lt;/b&gt;&lt;/newslead&gt;&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;We already came across the malware Winnti uses when we studied the &lt;b&gt;ShadowPad&lt;/b&gt; backdoor samples that we found in the compromised network of a state institution in Kyrgyzstan. In addition, earlier in the same network, we found another specialized backdoor called &lt;b&gt;PlugX&lt;/b&gt;, which has many intersections with ShadowPad in the code and network infrastructure. A &lt;a href="https://news.drweb.com/show/?lng=en&amp;amp;i=14048" target="_blank"&gt;separate material&lt;/a&gt; was devoted to the comparative analysis of both families.&lt;/p&gt;

&lt;p&gt;In this study, we analyze the uncovered malicious module, explore its algorithms and features, and define its connection with other well-known tools of the Winnti APT group. &lt;/p&gt;

&lt;h3&gt;Main features&lt;/h3&gt;

&lt;p&gt;On the infected device, the malicious module was located in the system directory &lt;span style="background: #e6e6e6; font-family: monospace; padding: 0.2em 0.3em;"&gt;C:\Windows\System32&lt;/span&gt; as oci.dll. Thus, the module was prepared for launch by the MSDTC (Microsoft Distributed Transaction Coordinator) system service using the DLL Hijacking method. According to our data, the file got to the computers in May 2020, but the method of initial infection remains unknown. The Event Log contained records of the creation of services designed to start and stop MSDTC, as well as for the backdoor execution.&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;Log Name:      System
Source:        Service Control Manager
Date:          23.11.2020 5:45:17
Event ID:      7045
Task Category: None
Level:         Information
Keywords:      Classic
User:          &amp;lt;redacted&amp;gt;
Computer:      &amp;lt;redacted&amp;gt;
Description:
A service was installed in the system.
 
Service Name:  IIJVXRUMDIKZTTLAMONQ
Service File Name:  net start msdtc
Service Type:  user mode service
Service Start Type:  demand start
Service Account:  LocalSystem
&lt;/code&gt;&lt;/pre&gt;

&lt;pre&gt;&lt;code&gt;Log Name:      System
Source:        Service Control Manager
Date:          23.11.2020 5:42:20
Event ID:      7045
Task Category: None
Level:         Information
Keywords:      Classic
User:          &amp;lt;redacted&amp;gt;
Computer:      &amp;lt;redacted&amp;gt;
Description:
A service was installed in the system.
 
Service Name:  AVNUXWSHUNXUGGAUXBRE
Service File Name:  net stop msdtc
Service Type:  user mode service
Service Start Type:  demand start
Service Account:  LocalSystem
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;We also found traces of other services running that had random names. Their files were located in directories like &lt;span style="background: #e6e6e6; font-family: monospace; padding: 0.2em 0.3em;"&gt;C:\Windows\Temp\&amp;lt;random1&amp;gt;\&amp;lt;random2&amp;gt;&lt;/span&gt;&amp;gt;, where &lt;span style="background: #e6e6e6; font-family: monospace; padding: 0.2em 0.3em;"&gt;random1&lt;/span&gt; and &lt;span style="background: #e6e6e6; font-family: monospace; padding: 0.2em 0.3em;"&gt;random2&lt;/span&gt; are strings of random length and random Latin characters.  At the time of the study, these services’ executable files were missing.&lt;/p&gt;

&lt;p&gt;An interesting find was a service that indicates the use of a smbexec.py utility for remote code execution from the&lt;a href="https://github.com/SecureAuthCorp/impacket" target="_blank" rel="noopener noreferrer"&gt; Impacket&lt;/a&gt; set. The attackers used this tool to establish remote access to the command shell in a semi-interactive mode.&lt;/p&gt;

&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/vms_spyder_main_1.png" class="preview"&gt; &lt;img src="https://st.drweb.com/static/new-www/news/2021/march/vms_spyder_main_1.1.png" alt="#drweb"/&gt; &lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;The studied malicious sample was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/virus/?i=23648386&amp;lng=en" target="_blank"&gt;BackDoor.Spyder.1&lt;/a&gt;. In one of the discovered Spyder samples, the debug logging functions and messages remained. Messages used when communicating with the C&amp;amp;C server contained the string "Spyder".&lt;/p&gt;

&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/vms_spyder_main_2.png" class="preview"&gt; &lt;img src="https://st.drweb.com/static/new-www/news/2021/march/vms_spyder_main_2.1.png" alt="#drweb"/&gt; &lt;/a&gt;
&lt;/p&gt; 

&lt;p&gt;The backdoor is notable for a number of interesting features. First, oci.dll contains the main PE module, but with missing file signatures. Erasing the header signatures was presumably done to obstruct the backdoor detection in the device's memory. Secondly, the payload itself does not carry malicious functionality, but serves to load and coordinate additional plug-ins received from the С&amp;amp;С server. With these plug-ins, the backdoor performs its main tasks. Therefore, this family has a modular structure, just like the other backdoor families used by &lt;b&gt;Winnti&lt;/b&gt; — the previously mentioned &lt;b&gt;ShadowPad&lt;/b&gt; and &lt;b&gt;PlugX&lt;/b&gt;.&lt;/p&gt;

&lt;p&gt;Analysis of &lt;b&gt;Spyder&lt;/b&gt;'s network infrastructure revealed a link to other Winnti attacks. In particular, the infrastructure used by the &lt;b&gt;Crosswalk&lt;/b&gt; and &lt;b&gt;ShadowPad&lt;/b&gt; backdoors described in the Positive Technologies study corresponds with some of the &lt;b&gt;Spyder&lt;/b&gt; samples. The graph below clearly shows the identified intersections.&lt;/p&gt;

&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/march/vms_spyder_main_3.png" class="preview"&gt; &lt;img src="https://st.drweb.com/static/new-www/news/2021/march/vms_spyder_main_3.1.png" alt="#drweb"/&gt; &lt;/a&gt;
&lt;/p&gt; 

&lt;p&gt;For a detailed description of &lt;a href="https://vms.drweb.com/virus/?i=23648386&amp;lng=en" target="_blank"&gt;BackDoor.Spyder.1&lt;/a&gt; and how it works, see the PDF-version of the study or the Doctor Web Virus Library.&lt;/p&gt;

&lt;h3&gt;Conclusion&lt;/h3&gt;

&lt;p&gt;The analyzed sample of &lt;b&gt;BackDoor.Spyder.1&lt;/b&gt; is notable primarily because its code does not perform direct malicious functions. Its main tasks are to covertly operate within the infected system and establish communication with the control server and then wait for operator commands. At the same time, it has a modular structure that allows the operator to scale its capabilities, providing any functionality depending on the needs of the attackers. The plug-ins make the considered sample similar to &lt;b&gt;ShadowPad&lt;/b&gt; and &lt;b&gt;PlugX&lt;/b&gt;, which, together with the intersections in their network infrastructures, allows us to conclude that it is used by &lt;b&gt;Winnti&lt;/b&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/APT_Spyder/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;.&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14151&amp;lng=en</guid><title>Last chance to exchange your Dr.Weblings for discounts before the Dr.Web + Me loyalty programme ends!</title><link>https://news.drweb.com/show/?i=14151&amp;lng=en&amp;c=5</link><pubDate>Mon, 01 Mar 2021 05:00:00 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;March 1, 2021&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;newslead&gt;Russian anti-virus company Doctor Web is discontinuing its loyalty programme Dr.Web + Me for customers outside the Russian Federation. Effective March 1, 2021, users will no longer be able to acquire virtual award points under the programme. Meanwhile, Dr.Web + Me will be replaced by an even more attractive offer for loyal customers.&lt;/newslead&gt; In spite of the programme being shut down, users will still be able to exchange their accrued Dr.Webling points for discounts or gift certificates under the programme's terms until May 31, 2021.&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;Throughout this spring the opportunity will remain to convert your earned virtual awards into discounts and get a new license for
&lt;a href="https://f2.drweb.com/lr/?to=https%3A%2F%2Festore.drweb.com%2Fhome%2F%3Flng%3Den%26from%3Dnews_stop_loyal_2021" target="_blank"&gt;Dr.Web Security Space&lt;/a&gt; (PC/Mac),
&lt;a href="https://f2.drweb.com/lr/?to=https%3A%2F%2Festore.drweb.com%2Fmobile%2F%3Flng%3Den%26from%3Dnews_stop_loyal_2021" target="_blank"&gt;Dr.Web Security Space for Mobile&lt;/a&gt; or
&lt;a href="https://f2.drweb.com/lr/?to=https%3A%2F%2Festore.drweb.com%2Fhome%2Fkatana%2F%3Flng%3Den%26from%3Dnews_stop_loyal_2021" target="_blank"&gt;Dr.Web KATANA&lt;/a&gt; — at 20%, 30%, or 50 % off.&lt;/p&gt;

&lt;p&gt;We invite all Dr.Web community members who still have some Dr.Weblings to spend to take advantage of this opportunity. Bear in mind that the products on display in our
&lt;a href="https://f2.drweb.com/lr/?to=https%3A%2F%2Festore.drweb.com%2Fhome%2F%3Flng%3Den%26from%3Dnews_stop_loyal_2021" target="_blank"&gt;eStore&lt;/a&gt; are never sold out! And don't forget: a Dr.Web license can be activated at any moment, no matter how long ago you purchased it.&lt;/p&gt;

&lt;p&gt;As an important aside, you can use a standard Dr.Web Security Space license (PC/Mac) to renew your previous license and, by doing so, also have 150 bonus days added to your new license period as soon as you register the license. And, the anti-virus for Android-powered gadgets comes completely free with this license!&lt;/p&gt;

&lt;p&gt;However, if for some reason you don't need to renew your license, you can help your loved ones keep their computers safe by gifting them a
&lt;a href="https://f2.drweb.com/lr/?to=https%3A%2F%2Fwww.drweb.com%2Factivities%2Fcoupons%2F%3Flng%3Den%26from%3Dnews_stop_loyal_2021" target="_blank"&gt;discount certificate&lt;/a&gt;. Let your Dr.Weblings work for those you hold dear.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Important!&lt;/b&gt; To exchange your Dr.Webling award points for discounts, you need to sign in under your account on Doctor Web's site. And remember: After May 31, all of your unspent Dr.Weblings will expire.&lt;/p&gt;

&lt;p&gt;Thank you for choosing Dr.Web!&lt;/p&gt;

&lt;p class="alignCenter"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/march/drweb_bann_DrWebkiZaSkidki_450x450_en.png" alt="#Dr.Web"&gt;&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14150&amp;lng=en</guid><title>Components updated in Dr.Web 12.0 products for Windows</title><link>https://news.drweb.com/show/?i=14150&amp;lng=en&amp;c=5</link><pubDate>Thu, 25 Feb 2021 09:28:38 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;February, 25 2020&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;newslead&gt;Russian anti-virus company Doctor Web has updated Dr.Web Anti-rootkit API (12.5.19.202102150), the component Dr.Web Firewall for Windows driver (12.05.03.01250), and Dr.Web Firewall for Windows (12.05.03.12180) in Dr.Web Security Space 12.0, Dr.Web Anti-virus 12.0 and Dr.Web Anti-virus 12.0 for Windows Servers. Furthermore, Dr.Web Security Space 12.0 and Dr.Web Anti-virus 12.0 have had the Dr.Web Net Filtering Service (12.5.6.12190) updated.&lt;/newslead&gt; The update resolves known issues and delivers minor upgrades.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Changes made to Dr.Web Anti-rootkit API:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;A compatibility issue involving Valorant's anti-cheat software Vanguard has been resolved;&lt;/li&gt;
	&lt;li&gt;Also addressed was an issue that might cause errors involving Promise FastTRAK RAID controllers.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Dr.Web Firewall for Windows driver:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;A high memory usage issue involving peer-to-peer applications has been addressed;&lt;/li&gt;
	&lt;li&gt;A defect that might cause errors if Logitech G Hub software was being used in the system has been resolved.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Changes made to Dr.Web Firewall for Windows and to Dr.Web Net filtering Service:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;Application security has been improved.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The update will be performed automatically; however, a system reboot will be required.&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14142&amp;lng=en</guid><title>Doctor Web’s January 2021 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=14142&amp;lng=en&amp;c=5</link><pubDate>Wed, 24 Feb 2021 15:39:34 GMT</pubDate><description>

 
&lt;p&gt;&lt;b&gt;February 24, 2021&lt;/b&gt;&lt;/p&gt;
&lt;p id="main"&gt;In January, Dr.Web anti-virus products for Android detected 11.32% less threats on protected devices compared to December, 2020. The number of observed malware decreased by 11.5% and adware by 15.93%. At the same time, the number of detected unwanted apps and riskware increased by 11.66% and 7.26% respectively. According to gathered statistics, the most common threats for users were adware trojans and malware designed to download other software and execute arbitrary code.&lt;/p&gt;
&lt;p&gt; Throughout January, Doctor Web malware analysts uncovered a large number of threats on Google Play. Numerous modifications of the &lt;a href="https://vms.drweb.com/search/?q=Adware.NewDich&amp;lng=en"&gt;&lt;b&gt;Adware.NewDich&lt;/b&gt;&lt;/a&gt; adware modules built into various apps were among them. Moreover, new trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family designed to load fraudulent websites, as well as malicious apps from the &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt; family subscribing users to premium mobile services and executing arbitrary code were also discovered.&lt;/p&gt;
&lt;p&gt;With that, our specialists have observed new attacks involving banking trojans. One of them was found in a fake banking app available on Google Play while others were spread through malicious websites created by cybercriminals.&lt;/p&gt;

&lt;div class="paddXM paddYM bg_ocean_1 white"&gt;
  &lt;h4 class="white alignCenter"&gt;PRINCIPAL TRENDS IN JANUARY&lt;/h4&gt;
  &lt;ul&gt;
    &lt;li&gt;A decreased number of threats detected on Android devices&lt;/li&gt;
    &lt;li&gt;The discovery of a large number of malware and unwanted apps on Google Play&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;h2 id="month"&gt;Threat of the month&lt;/h2&gt;
&lt;p&gt;At the beginning of January, Doctor Web malware analysts found a number of apps with built-in &lt;a href="https://vms.drweb.com/search/?q=Adware.NewDich&amp;lng=en"&gt;&lt;b&gt;Adware.NewDich&lt;/b&gt;&lt;/a&gt; adware modules that load various websites upon C&amp;C server command. For instance, they can load both harmless sites and sites that contain ads, as well as bogus or fraudulent sites used for phishing. Because they are loaded when users are not interacting with apps containing &lt;a href="https://vms.drweb.com/search/?q=Adware.NewDich&amp;lng=en"&gt;&lt;b&gt;Adware.NewDich&lt;/b&gt;&lt;/a&gt; modules, it is troublesome for Android device owners to figure out why their gadgets are behaving strangely.&lt;/p&gt;
&lt;p&gt;Examples of software that were found to contain these adware modules are shown below:&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/01_Adware.NewDich_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/01_Adware.NewDich_1.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/01_Adware.NewDich_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/01_Adware.NewDich_2.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/01_Adware.NewDich_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/01_Adware.NewDich_3.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/01_Adware.NewDich_4.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/01_Adware.NewDich_4.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/01_Adware.NewDich_5.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/01_Adware.NewDich_5.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/01_Adware.NewDich_6.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/01_Adware.NewDich_6.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;Examples of websites they load:&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_1.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_2.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_3.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_4.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_4.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_5.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_5.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_6.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_6.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_7.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_7.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_8_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_8_en.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_9.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_9.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_10.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_10.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_11.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_11.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_12.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/02_Adware.NewDich_ad_12.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;Web pages of various referral programs that redirect users to the apps hosted on Google Play are often loaded by &lt;a href="https://vms.drweb.com/search/?q=Adware.NewDich&amp;lng=en"&gt;&lt;b&gt;Adware.NewDich&lt;/b&gt;&lt;/a&gt; modules. The app called “YBT Exchange”, supposedly designed to work with one of the crypto exchanges was one of them. Doctor Web malware analysts, however, found that this software is nothing but a new banking trojan, which was added to the virus base as &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;strong&gt;.3684&lt;/strong&gt;. Its functionality included the hijacking of logins, passwords and confirmation codes. It was also able to intercept contents of incoming notifications, for which the trojan requested specific system permissions. After our report to Google, this banker was removed from the Android app store.&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/03_Android.Banker.3684_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/03_Android.Banker.3684_1.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/03_Android.Banker.3684_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/03_Android.Banker.3684_2.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/03_Android.Banker.3684_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/03_Android.Banker.3684_3.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/03_Android.Banker.3684_4.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/03_Android.Banker.3684_4.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/03_Android.Banker.3684_5.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/03_Android.Banker.3684_5.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/03_Android.Banker.3684_6.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/03_Android.Banker.3684_6.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;Doctor Web malware analysts found that at least 21 apps had these adware modules built into them. The conducted research indicated that owners of these apps and the developers of &lt;a href="https://vms.drweb.com/search/?q=Adware.NewDich&amp;lng=en"&gt;&lt;b&gt;Adware.NewDich&lt;/b&gt;&lt;/a&gt; are likely directly related. Soon after this adware network attracted significant attention of the IT community and security specialists, its administrators panicked and began rolling out software updates, trying to implement mechanisms to avoid the anti-virus software from detecting this adware or simply removing the modules from the apps. One of the affected programs was later removed from Google Play completely. With that, nothing prevents the actors behind &lt;a href="https://vms.drweb.com/search/?q=Adware.NewDich&amp;lng=en"&gt;&lt;b&gt;Adware.NewDich&lt;/b&gt;&lt;/a&gt; from updating the remaining software at any time and reintroducing modules, which our specialists have already observed several times.&lt;/p&gt;
&lt;p&gt;The list of the apps containing the &lt;a href="https://vms.drweb.com/search/?q=Adware.NewDich&amp;lng=en"&gt;&lt;b&gt;Adware.NewDich&lt;/b&gt;&lt;/a&gt; modules:&lt;/p&gt;
&lt;div class="ScrollX"&gt;
&lt;table class="Table"&gt;
  &lt;thead&gt;
    &lt;tr&gt;
    &lt;th&gt;Name of the packet&lt;/th&gt;
    &lt;th&gt;Presence of the  Adware.NewDich module&lt;/th&gt;
    &lt;th&gt;The app was removed from Google Play&lt;/th&gt;
  &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;&lt;tr&gt;
    &lt;td&gt;com.qrcodescanner.barcodescanner&lt;/td&gt;&lt;td&gt;Was present in last relevant 1.75 version&lt;/td&gt;&lt;td&gt;Yes&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.speak.better.correctspelling&lt;/td&gt;&lt;td&gt;Present in relevant 679.0 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.correct.spelling.learn.english&lt;/td&gt;&lt;td&gt;Present in relevant 50.0 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.bluetooth.autoconnect.anybtdevices&lt;/td&gt;&lt;td&gt;Present in relevant 2.5 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.bluetooth.share.app&lt;/td&gt;&lt;td&gt;Present in relevant 1.8 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;org.strong.booster.cleaner.fixer&lt;/td&gt;&lt;td&gt;Absent in relevant 5.9 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.smartwatch.bluetooth.sync.notifications&lt;/td&gt;&lt;td&gt;Absent in relevant 85.0 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.blogspot.bidatop.nigeriacurrentaffairs2018&lt;/td&gt;&lt;td&gt;Present in relevant 3.2 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.theantivirus.cleanerandbooster&lt;/td&gt;&lt;td&gt;Absent in relevant 9.3 version&lt;/td&gt;&lt;td&gt;Нет&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.clean.booster.optimizer&lt;/td&gt;&lt;td&gt; Absent in relevant 9.1 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;flashlight.free.light.bright.torch&lt;/td&gt;&lt;td&gt;Absent in relevant 66.0 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.meow.animal.translator&lt;/td&gt;&lt;td&gt;Absent in relevant 1.9 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.gogamegone.superfileexplorer&lt;/td&gt;&lt;td&gt;Absent in relevant 2.0 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.super.battery.full.alarm&lt;/td&gt;&lt;td&gt;Absent in relevant 2.2 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.apps.best.notepad.writing&lt;/td&gt;&lt;td&gt;Absent in relevant 7.7 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;ksmart.watch.connecting&lt;/td&gt;&lt;td&gt;Absent in relevant 32.0 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.average.heart.rate&lt;/td&gt;&lt;td&gt;Absent in relevant 7.0 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.apps.best.alam.clocks&lt;/td&gt;&lt;td&gt;Absent in relevant 4.7 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.booster.game.accelerator.top&lt;/td&gt;&lt;td&gt;Absent in relevant 2.1 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;org.booster.accelerator.optimizer.colorful&lt;/td&gt;&lt;td&gt;Absent in relevant 61.0 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td&gt;com.color.game.booster&lt;/td&gt;&lt;td&gt;Absent in relevant 2.1 version&lt;/td&gt;&lt;td&gt;No&lt;/td&gt;
  &lt;/tr&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;

&lt;p&gt;Features of &lt;a href="https://vms.drweb.com/search/?q=Adware.NewDich&amp;lng=en"&gt;&lt;b&gt;Adware.NewDich&lt;/b&gt;&lt;/a&gt;:&lt;/p&gt;
&lt;ul&gt;
   &lt;li&gt;It is built into full-featured software to hide from users and not arouse any suspicion.&lt;/li&gt;
   &lt;li&gt;The activity develops with a delay (up to several days) after the hosting applications are installed and launched.&lt;/li&gt;
   &lt;li&gt;Promoted websites loading is performed when the apps containing these modules are closed and users are not interacting with or using them for some time.&lt;/li&gt;
   &lt;li&gt;The malicious actors constantly monitor if anti-virus software detects the modules and promptly make changes to them to release new versions to counter the detection.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="stat"&gt;According to statistics collected by Dr.Web for Android&lt;/h2&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/04_malware_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/04_malware_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.RemoteCode&amp;lng=en"&gt;&lt;b&gt;Android.RemoteCode&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.284.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A malicious application that downloads and executes arbitrary code. Depending on its modification, it can load various websites, open web links, click on advertising banners, subscribe users to premium services and perform other actions.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1994&lt;/b&gt;&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.518.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Trojans designed to display obnoxious ads and distributed as popular applications. In some cases, they can be installed in the system directory by other malware.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Triada&amp;lng=en"&gt;&lt;b&gt;Android.Triada&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.510.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A multifunctional trojan performing various malicious actions. This malware belongs to the trojan family that infects other apps’ processes. Some modifications of this family were found in the firmware of Android devices, which attackers implanted during manufacturing. Some of them can also exploit various vulnerabilities to gain access to the protected system files and folders.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Click&amp;lng=en"&gt;&lt;b&gt;Android.Click&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.348.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A malicious application that loads websites, clicks on banner ads, and follows links. It can be distributed as harmless programs without arousing suspicion among users.&lt;/dd&gt;  
&lt;/dl&gt;

&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/05_unwanted_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/05_unwanted_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FreeAndroidSpy&amp;lng=en"&gt;&lt;b&gt;Program.FreeAndroidSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.NeoSpy&amp;lng=en"&gt;&lt;b&gt;Program.NeoSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.Mrecorder&amp;lng=en"&gt;&lt;b&gt;Program.Mrecorder&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.Reptilicus&amp;lng=en"&gt;&lt;b&gt;Program.Reptilicus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Software that monitors Android user activity and may serve as a tool for cyber espionage. These apps can track device locations, collect information from SMS and social media messages, copy documents, photo and video, spy on phone calls, etc.&lt;/dd&gt;
  &lt;dt&gt;&lt;b&gt;Program.FakeAntiVirus.2.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of non-existing threats, mislead them and demand they purchase the full version of the software.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CreditSpy&amp;lng=en"&gt;&lt;b&gt;Program.CreditSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.2&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for programs designed to assign credit ratings to users based on their personal data. These applications upload SMS, contact information from phonebooks, call history and other information to the remote server.&lt;/dd&gt;
&lt;/dl&gt;

&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/06_riskware_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/06_riskware_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.6.origin&lt;/b&gt;&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.13.origin&lt;/b&gt;&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Riskware platforms that allow applications to launch APK files without installation. They create a virtual runtime environment that does not affect the main operating system.&lt;/dd&gt; 
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Obfuscapk&amp;lng=en"&gt;&lt;b&gt;Tool.Obfuscapk&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for applications protected by the Obfuscapk obfuscation tool. This tool is used to automatically modify and scramble Android apps’ source code to make reverse engineering more difficult. Cybercriminals use the tool to protect malicious applications from being detected by anti-virus programs.&lt;/dd&gt;
&lt;/dl&gt;

&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/07_adware_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/07_adware_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;Program modules incorporated into Android applications and designed to display obnoxious ads on Android devices. Depending on their family and modifications, they can display full screen ads and block other apps’ windows, show various notifications, create shortcuts and load websites.&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.36.origin&lt;/b&gt;&lt;/li&gt;
  &lt;li&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.6547&lt;/b&gt;&lt;/li&gt;
  &lt;li&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.16896&lt;/b&gt;&lt;/li&gt;
  &lt;li&gt;&lt;b&gt;Adware.Myteam.2.origin&lt;/b&gt;&lt;/li&gt;
  &lt;li&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Overlay&amp;lng=en"&gt;&lt;b&gt;Adware.Overlay&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="google"&gt;Threats on Google Play&lt;/h2&gt;
&lt;p&gt;In addition to apps with built-in &lt;a href="https://vms.drweb.com/search/?q=Adware.NewDich&amp;lng=en"&gt;&lt;b&gt;Adware.NewDich&lt;/b&gt;&lt;/a&gt; adware modules, Doctor Web specialists discovered a large number of trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family, which were spread as reference software and handbooks with information about tax refunds and the availability of welfare payouts and other social compensations. There were also other modifications of these trojans disguised, for instance, as programs designed to search information about lotteries and receiving gifts from popular bloggers.&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/08_Android.FakeApp.219_dev.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/08_Android.FakeApp.219_dev.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/09_Android.FakeApp.219_dev.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/09_Android.FakeApp.219_dev.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/10_Android.FakeApp.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/10_Android.FakeApp.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;Similar to other trojans of this type, which were discovered earlier, current modifications loaded fraudulent websites where potential victims were informed about the supposed payouts from the government. To “receive” the money, users were asked to provide their personal information, as well as to pay for the lawyers’ time, document preparation, and tax or fees for transferring the money to the bank account. In fact, victims didn’t receive any funds, but cybercriminals did steal their confidential information and money.&lt;/p&gt;
&lt;p&gt;In addition, some modifications of these malicious apps periodically displayed notifications where users were also informed about available “payouts” and “compensations”. In this way, malicious actors tried to attract additional attention from potential victims so they would visit the fraudulent websites more often.&lt;/p&gt;
&lt;p&gt;Examples of websites various modifications of the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojans load:&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/11_fake_site_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/11_fake_site_1.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/11_fake_site_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/11_fake_site_2.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/11_fake_site_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/11_fake_site_3.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/11_fake_site_4.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/11_fake_site_4.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;The examples of fraudulent notifications with the information about “payouts” and “compensations” displayed by these malicious apps:&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/12_FakeApp_notification_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/12_FakeApp_notification_1.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/12_FakeApp_notification_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/12_FakeApp_notification_2.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/12_FakeApp_notification_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/12_FakeApp_notification_3.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/12_FakeApp_notification_4.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/12_FakeApp_notification_4.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;Moreover, other multifunctional trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt; family were also found—they were dubbed &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.496&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.534&lt;/b&gt;, and &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.535&lt;/b&gt;. These trojans were spread under the guise of harmless apps, such as translation software and multimedia editing software designed to create gif animations. Their real functionality, however, was to download and execute arbitrary code, as well as to intercept the contents of incoming notifications and subscribe users to premium services.&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/13_Android.Joker.496.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/13_Android.Joker.496.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/14_Android.Joker.534.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/14_Android.Joker.534.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/15_Android.Joker.535.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/15_Android.Joker.535.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;A new banking trojan dubbed &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3679&lt;/b&gt; was also among the uncovered threats. It was spread as an application designed to work with Santander bank’s Esfera rebate and bonus program for Brazilian users. &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3679&lt;/b&gt;’s main functions were phishing and confidential data stealing, while its primary target was the Santander Empresas banking application.&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/16_Android.Banker.3679_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/16_Android.Banker.3679_1.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;Upon installation and launch, the trojan requested access to the Accessibility Service function of the Android OS—allegedly to continue working with the app. In fact, it needed the requested functionality to automatically perform malicious actions. If a victim agreed to provide the necessary system privileges, the banker received control over the infected device and could click on various menu elements, buttons, read the contents of other apps’ windows, etc.&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/16_Android.Banker.3679_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/16_Android.Banker.3679_2.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/16_Android.Banker.3679_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/16_Android.Banker.3679_3.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/16_Android.Banker.3679_4.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/16_Android.Banker.3679_4.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;h2 id="bank"&gt;Banking trojans&lt;/h2&gt;
&lt;p&gt;Alongside banking trojans found on Google Play, Android device owners were targeted by bankers that spread through the malicious websites. For example, Doctor Web specialists observed other attacks on Japanese users where trojans from various banking malware families were involved. The &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3954&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.SmsSpy&amp;lng=en"&gt;&lt;b&gt;Android.SmsSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.833.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.SmsSpy&amp;lng=en"&gt;&lt;b&gt;Android.SmsSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.10809&lt;/b&gt;, and &lt;a href="https://vms.drweb.com/search/?q=Android.Spy&amp;lng=en"&gt;&lt;b&gt;Android.Spy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.679.origin&lt;/b&gt; trojans were among them. They were downloaded from fake postal and delivery service websites under the guise of updates for Chrome, Play Market and other legitimate software.&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/17_Japan_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/17_Japan_1.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/17_Japan_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/17_Japan_2.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/17_Japan_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/17_Japan_3.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/17_Japan_4.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/17_Japan_4.1.png" alt="#drweb"&gt;&lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2021/january/17_Japan_5.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/17_Japan_5.1.png" alt="#drweb"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web for Android.&lt;/p&gt;

&lt;!-- ANDROID_PROTECT_BLOCK_NEW --&gt;
&lt;div class="CellBlock noPadd AndroidBlockNew"&gt;
    &lt;div class="container"&gt;
        &lt;div class="-Grid_1of6 -viewM-Grid_1of1"&gt;

            &lt;div class="DecorBg" style="background-color: #4788aa;"&gt;&lt;/div&gt;

            &lt;div class="Grid Grid_span2 alignMiddle alignCenter paddYM" style="background: url(https://st.drweb.com/static/new-www/img/bg_blue_geom.1.jpg); center; background-size: cover; background-color: #4788aa;"&gt;
                &lt;img src="https://st.drweb.com/static/new-www/img/drweb_ss_blue_noBg.png" alt="Dr.Web Mobile Security"&gt;
            &lt;/div&gt;&lt;!--
                
            --&gt;&lt;div class="Grid Grid_span4 alignMiddle _viewM_paddYM"&gt;
                &lt;div class="paddLL _viewS_noPaddL"&gt;
                    &lt;h2 class="noMargY white _viewM_alignCenter"&gt;Your Android needs protection.&lt;/h2&gt;
                    &lt;h2 class="margTC noMargB white _viewM_alignCenter"&gt;Use Dr.Web&lt;/h2&gt;
                    &lt;ul class="IconList white fontM margBS _viewM_fontS"&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;The first Russian anti-virus for Android&lt;/li&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Over 140 million downloads—just from Google Play&lt;/li&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Available free of charge for users of Dr.Web home products&lt;/li&gt;
                    &lt;/ul&gt;
                    &lt;p class="noMargY _viewM_alignCenter"&gt;
                        &lt;a href="https://f2.drweb.com/lr/?to=https%3A%2F%2Fdownload.drweb.com%2Fandroid%2F%3Flng%3Den%26from%3DANDROID_PROTECT_BLOCK_NEW" class="Btn bg_main_green_5"&gt;
                            &lt;span class="Btn-body icon icon_right" data-icon="#common-arrowRight"&gt;
                                &lt;span class="Btn-text uppercase"&gt;Free download&lt;/span&gt;
                            &lt;/span&gt;
                        &lt;/a&gt;    
                    &lt;/p&gt;
                &lt;/div&gt;
            &lt;/div&gt;

        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;!-- ANDROID_PROTECT_BLOCK_NEW end --&gt;


</description></item><item><guid>https://news.drweb.com/show/?i=14144&amp;lng=en</guid><title>Doctor Web’s January 2021 virus activity review</title><link>https://news.drweb.com/show/?i=14144&amp;lng=en&amp;c=5</link><pubDate>Wed, 24 Feb 2021 16:28:44 GMT</pubDate><description>


&lt;p&gt;February 24, 2021&lt;/p&gt;
&lt;p id="main"&gt;Our January analysis of Dr.Web’s statistics revealed a 4.92% increase in the total number of threats compared to the previous month. The number of unique threats also increased by 13.11%. Adware and malware browser extensions still occupy the top spot for detected threats. Various modifications of the AgentTesla stealers, a backdoor written in VB.NET and malicious programs exploiting vulnerabilities in Microsoft Office utilities were the most frequently detected malicious software in email traffic.&lt;/p&gt;
&lt;p&gt;In January, the number of user requests to decrypt files affected by encoders increased by 29.27% compared with December.  &lt;a href="https://vms.drweb.com/search/?q=Trojan.Encoder.26996&amp;lng=en"&gt;&lt;b&gt;Trojan.Encoder.26996&lt;/b&gt;&lt;/a&gt; was the most active, accounting for 24.11% of all incidents. &lt;/p&gt;
&lt;div class="paddXM paddYM bg_ocean_1 white"&gt;
&lt;h4 class="white alignCenter"&gt;Principal trends in January&lt;/h4&gt;
  &lt;ul&gt;
    &lt;li&gt;Growth in malware spreading activity&lt;/li&gt;
    &lt;li&gt;Adware remain among the most active threats&lt;/li&gt;
    &lt;li&gt;An increase in the number of requests to decrypt files affected by encoders&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;h2 id="stat"&gt;According to Doctor Web’s statistics service&lt;/h2&gt;
&lt;p class="alignCenter"&gt;&lt;a href="https://st.drweb.com/static/new-www/news/2021/january/01_stat_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/01_stat_en.1.png" alt="According to Doctor Web’s statistics service #drweb"/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The most common threats in January:&lt;/p&gt;
&lt;dl class="dlList"&gt;
  &lt;dt&gt;Adware.Elemental.17&lt;/dt&gt;
  &lt;dd&gt;Adware that spreads through file sharing services as a result of link spoofing. Instead of normal files, victims receive applications that display advertisements and install unwanted software.&lt;/dd&gt;
  &lt;dt&gt;Trojan.BPlug.3867&lt;/dt&gt;
  &lt;dd&gt;A malicious browser extension designed to perform web injections into viewed webpages and block third-party advertisements.&lt;/dd&gt;
  &lt;dt&gt;Adware.SweetLabs.4&lt;/dt&gt;
  &lt;dd&gt;An alternative app store and add-on for Windows GUI from the creators of Adware.Opencandy.&lt;/dd&gt;
  &lt;dt&gt;Adware.Softobase.15&lt;/dt&gt;
  &lt;dd&gt;Installation adware that spreads outdated software and changes the browser settings.&lt;/dd&gt;
  &lt;dt&gt;Adware.Downware.19629&lt;/dt&gt;
  &lt;dd&gt;Adware that often serves as an intermediary installer of pirate software.&lt;/dd&gt;
&lt;/dl&gt;

&lt;h2&gt;Statistics for malware discovered in email traffic&lt;/h2&gt;
&lt;p class="alignCenter"&gt;&lt;a href="https://st.drweb.com/static/new-www/news/2021/january/02_mail_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/02_mail_en.1.png" alt="Statistics for malware discovered in email traffic #drweb"/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Trojan.Siggen11.57608&amp;lng=en"&gt;&lt;b&gt;Trojan.Siggen11.57608&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
  &lt;dd&gt;A modification of the stealer malware, known as AgentTesla. It can be used as a keylogger and is designed to steal confidential data.&lt;/dd&gt;
  &lt;dt&gt;Trojan.Packed2.42809&lt;/dt&gt;
  &lt;dd&gt;One of the many modifications of the AgentTesla stealer, obfuscated by a packer tool.&lt;/dd&gt;
  &lt;dt&gt;W97M.DownLoader.2938&lt;/dt&gt;
  &lt;dd&gt;A family of downloader trojans that exploits vulnerabilities in Microsoft Office documents and can download other malicious programs onto a compromised computer.&lt;/dd&gt;
  &lt;dt&gt;BackDoor.SpyBotNET.25&lt;/dt&gt;
  &lt;dd&gt;A backdoor written in VB.NET and designed to operate with a file system (to copy, create, delete catalogs, etc.), terminate processes, and take screenshots.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=&lt;b&gt;Trojan.SpyBot.699&lt;/b&gt;&amp;lng=en"&gt;&lt;b&gt;&lt;b&gt;Trojan.SpyBot.699&lt;/b&gt;&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
  &lt;dd&gt;A multi-module banking trojan that allows cybercriminals to download and launch various applications on an infected device and run arbitrary code.&lt;/dd&gt;
&lt;/dl&gt;

&lt;h2 id="encruptor"&gt;Encryption ransomware&lt;/h2&gt;
&lt;p&gt;In January, Doctor Web’s virus laboratory registered 29.27% more requests to decode files encoded by trojan ransomware than in December.&lt;/p&gt;
&lt;p class="alignCenter"&gt;&lt;a href="https://st.drweb.com/static/new-www/news/2021/january/03_enc_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/03_enc_en.1.png" alt="Encryption ransomware #drweb"/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href="https://vms.drweb.com/search/?q=Trojan.Encoder.26996&amp;lng=en"&gt;&lt;b&gt;Trojan.Encoder.26996&lt;/b&gt;&lt;/a&gt; — 24.11%&lt;/li&gt;
  &lt;li&gt;&lt;a href="https://vms.drweb.com/search/?q=Trojan.Encoder.567&amp;lng=en"&gt;&lt;b&gt;Trojan.Encoder.567&lt;/b&gt;&lt;/a&gt; — 13.10%&lt;/li&gt;
  &lt;li&gt;&lt;b&gt;Trojan.Encoder.29750&lt;/b&gt; — 7.44%&lt;/li&gt;
  &lt;li&gt;&lt;b&gt;Trojan.Encoder.11549&lt;/b&gt; — 2.08%&lt;/li&gt;
  &lt;li&gt;&lt;b&gt;Trojan.Encoder.30356&lt;/b&gt; — 1.49%&lt;/li&gt;
&lt;/ul&gt;

&lt;!-- BLOCK_PROTECT_NEW --&gt;
&lt;div class="CellBlock"&gt;
  &lt;h3 class="fontXL alignCenter"&gt;
      &lt;span class=""&gt; Dr.Web Security Space for Windows protects against encryption ransomware &lt;/span&gt;
    &lt;/h3&gt;
  &lt;div class="
      container
      -Grid_1of4
      -viewM-Grid_1of1
      uppercase
      noneUnderline
    "&gt;    

      &lt;div class="
        Grid
        Grid_span2
        margTS
        _viewS_noMargT
        _viewM_relative
        -Grid_cell
        -Grid_1of2
        -viewS-Grid_1of1
      "&gt;
            &lt;div class="Grid _viewS_relative _viewS_margTS bgOpacity _viewS_margBS"&gt;
                  &lt;div class="Grid-col space_1of4 _viewM_space_1of2 _viewS_space_1of1"&gt;
                    &lt;div class="Grid-col-bg bg_main_green_5"&gt;&lt;/div&gt;
                  &lt;/div&gt;

                  &lt;div class=""&gt;
                    &lt;a href="https://st.drweb.com/static/new-www/files/booklets/brochure_encoder_en.pdf" class="block noneUnderline white paddXM paddYS _viewL_fontXS _viewM_fontS  _viewS_paddYM"&gt; Configure Dr.Web to protect your computer from encryption ransomware &lt;/a&gt;
                  &lt;/div&gt;
            &lt;/div&gt;&lt;!--
         --&gt;&lt;div class="Grid _viewS_relative _viewS_margTS bgOpacity _viewS_margBS"&gt;
                  &lt;div class="Grid-col space_1of4 _viewM_space_1of2 _viewS_space_1of1"&gt;
                    &lt;div class="Grid-col-bg bg_violet_4"&gt;&lt;/div&gt;
                  &lt;/div&gt;

                  &lt;div class="paddTS"&gt;
                    &lt;a href="https://training.drweb.com/users/?lng=en" class="block noneUnderline white paddXM paddTS paddBM paddLL _viewL_paddLM _viewL_paddRS  _viewS_paddYM"&gt; Training course &lt;/a&gt;
                  &lt;/div&gt;
            &lt;/div&gt;
      &lt;/div&gt;&lt;!--
      --&gt;&lt;div class="
        Grid
        Grid_span2
        margTS
        _viewS_noMargT
        _viewM_relative
        -Grid_cell
        -Grid_1of2
        -viewS-Grid_1of1
      "&gt;
              &lt;div class="Grid _viewS_relative _viewS_margTS bgOpacity _viewS_margBS"&gt;
                    &lt;div class="Grid-col space_1of4 _viewM_space_1of2 _viewS_space_1of1"&gt;
                      &lt;div class="Grid-col-bg bg_khaki_6"&gt;&lt;/div&gt;
                    &lt;/div&gt;

                    &lt;div class=""&gt;
                      &lt;a href="https://products.drweb.com/decryption_from_ransomware/disclaimer/?lng=en" class="block noneUnderline white paddXM paddYS _viewM_paddTM  _viewS_paddYM"&gt; Free data recovery &lt;/a&gt;
                    &lt;/div&gt;
              &lt;/div&gt;&lt;!--
           --&gt;&lt;div class="Grid _viewS_relative _viewS_margTS bgOpacity _viewS_margBS"&gt;
                    &lt;div class="Grid-col space_1of4 _viewM_space_1of2 _viewS_space_1of1"&gt;
                      &lt;div class="Grid-col-bg bg_skiey_3"&gt;&lt;/div&gt;
                    &lt;/div&gt;

                    &lt;div class="paddTS"&gt;                      
                        &lt;a href="https://products.drweb.com/decryption_from_ransomware/?lng=en" class="block noneUnderline white paddXM paddTS paddBM paddLL _viewL_paddLM _viewL_paddRS _viewM_paddTM  _viewS_paddYM"&gt; Dr.Web Rescue Pack &lt;/a&gt;                      
                    &lt;/div&gt;
              &lt;/div&gt;
      &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;!-- BLOCK_PROTECT_NEW END --&gt;


&lt;h2 id="dangerous"&gt;Dangerous websites&lt;/h2&gt;
&lt;p&gt;During January 2021, Doctor Web Internet analysts uncovered many fraudulent and phishing websites used by the cybercriminals to steal users’ money and personal data. The victims were most often propositioned to receive some nonexistent payment from the state or a remittance from a private individual. In all cases, a commission was required to receive the payments.&lt;/p&gt;

&lt;p style="text-align:center"&gt;&lt;a href="https://st.drweb.com/static/new-www/news/2021/january/URL_1.jpg" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/URL_1.1.jpg" alt="#drweb"/&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This is a snapshot of the fraudulent webpage. It invites a victim to receive a fake payment and claims that the amount has been transferred to an “internal” account. The trick is that the user has to pay a fee first in order to complete the transfer.&lt;/p&gt;

&lt;p&gt;Also in January, analysts discovered several fake banking websites. The fraudsters registered the websites in the “.рф” domain and used the same template to create the same type of webpages that differ only in the fictitious names of the banks. These bogus resources were used to steal funds from the accounts of gullible users.&lt;/p&gt;

&lt;p style="text-align:center"&gt;&lt;a href="https://st.drweb.com/static/new-www/news/2021/january/URL_2.jpg" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2021/january/URL_2.1.jpg" alt="#drweb"/&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This is a snapshot of nonexistent bank’s website. A user can browse the clickable sections and read the contents.&lt;/p&gt;

&lt;p&gt;In January, Doctor Web specialists also detected numerous fake online payment services that were used in conjunction with fraudulent marketplaces and allowed cybercrooks to steal not only money, but also users ' bank card data.&lt;/p&gt;

&lt;div class="CellBlock dangerous_urls_new alignCenter"&gt;
  &lt;a href="https://antifraud.drweb.com/dangerous_urls" class="fontM font2X white textShadow"&gt;Find out more about Dr.Web non-recommended sites&lt;/a&gt;
&lt;/div&gt;

&lt;h2 id="formobile"&gt;Malicious and unwanted programs for mobile devices&lt;/h2&gt;
&lt;p&gt;The total number of January threats on Android devices decreased by 11.32% compared to the previous month. With that, the malicious applications that can download other software and execute arbitrary code, as well as trojans that showed ads were among the most common mobile threats.&lt;/p&gt;
&lt;p&gt;During the month, Doctor Web’s virus analysts identified many malicious apps of the  &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family, designed to load fraudulent websites in the Google Play catalog. In addition, other modifications of the  &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt; multi-functional trojan family were uncovered. One of their features is to subscribe users to expensive mobile services. The malware creators also distributed applications with built-in unwanted advertising modules called  &lt;a href="https://vms.drweb.com/search/?q=Adware.NewDich&amp;lng=en"&gt;&lt;b&gt;Adware.NewDich&lt;/b&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;These modules loaded various websites in the browser, which could include both harmless and malicious resources, as well as webpages with ads.&lt;/p&gt;
&lt;p&gt;The banking trojans were also active. One of them was discovered in Google Play and the others were distributed via malicious websites.&lt;/p&gt;
&lt;p&gt;The following January events related to mobile malware are the most noteworthy:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;A decline in malware activity on protected devices&lt;/li&gt;
  &lt;li&gt;The emergence of many new malicious and unwanted programs in the Google Play catalog.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Find out more about malicious and unwanted programs for mobile devices in our special &lt;a href="https://news.drweb.com/show/review/?i=14142&amp;amp;lng=en"&gt;overview&lt;/a&gt;.&lt;/p&gt;

&lt;!-- BLOCK_KNOW_MORE --&gt;
&lt;div class="CellBlock"&gt;
  &lt;h3 class="fontXL alignCenter"&gt;
      &lt;span class=""&gt; Learn more with Dr.Web &lt;/span&gt;
    &lt;/h3&gt;
  &lt;div class="
      container
      -Grid_1of4
      -viewM-Grid_1of1
      uppercase
      noneUnderline
    "&gt;    
      &lt;div class="
        Grid
        Grid_span2
        margTS
        _viewS_noMargT
        _viewM_relative
        -Grid_cell
        -Grid_1of2
        -viewS-Grid_1of1
      "&gt;
            &lt;div class="Grid _viewS_relative _viewS_margTS bgOpacity _viewS_margBS"&gt;
                  &lt;div class="Grid-col space_1of4 _viewM_space_1of2 _viewS_space_1of1"&gt;
                    &lt;div class="Grid-col-bg bg_main_green_1"&gt;&lt;/div&gt;
                  &lt;/div&gt;

                  &lt;div class=""&gt;
                    &lt;a href="https://www.drweb.com/pravda/" class="block noneUnderline white paddXM paddYS _viewL_fontXS- _viewM_fontS- _viewM_paddTM  _viewS_paddYM"&gt; «The Anti-virus Times» &lt;/a&gt;
                  &lt;/div&gt;
            &lt;/div&gt;&lt;!--
         --&gt;&lt;div class="Grid _viewS_relative _viewS_margTS bgOpacity _viewS_margBS"&gt;
                  &lt;div class="Grid-col space_1of4 _viewM_space_1of2 _viewS_space_1of1"&gt;
                    &lt;div class="Grid-col-bg bg_violet_2"&gt;&lt;/div&gt;
                  &lt;/div&gt;

                  &lt;div class="paddTS"&gt;
                    &lt;a href="https://training.drweb.com/" class="block noneUnderline white paddXM paddTS paddBM paddLL _viewL_paddLM _viewL_paddRS  _viewS_paddYM"&gt; Training course &lt;/a&gt;
                  &lt;/div&gt;
            &lt;/div&gt;
      &lt;/div&gt;&lt;!--
      --&gt;&lt;div class="
        Grid
        Grid_span2
        margTS
        _viewS_noMargT
        _viewM_relative
        -Grid_cell
        -Grid_1of2
        -viewS-Grid_1of1
      "&gt;              
               &lt;div class="Grid _viewS_relative _viewS_margTS bgOpacity _viewS_margBS"&gt;
                    &lt;div class="Grid-col space_1of4 _viewM_space_1of2 _viewS_space_1of1"&gt;
                      &lt;div class="Grid-col-bg bg_lilac_1"&gt;&lt;/div&gt;
                    &lt;/div&gt;

                    &lt;div class=""&gt;
                      &lt;a href="https://antifraud.drweb.com/info/" class="block noneUnderline white paddXM paddYS _viewL_fontXS _viewM_fontS _viewM_paddTM  _viewS_paddYM"&gt; Educational projects &lt;/a&gt;
                    &lt;/div&gt;
              &lt;/div&gt;&lt;!--

             --&gt;&lt;div class="Grid _viewS_relative _viewS_margTS bgOpacity _viewS_margBS"&gt;
                    &lt;div class="Grid-col space_1of4 _viewM_space_1of2 _viewS_space_1of1"&gt;
                      &lt;div class="Grid-col-bg bg_ocean_4"&gt;&lt;/div&gt;
                    &lt;/div&gt;

                    &lt;div class="paddTS"&gt;                      
                        &lt;a href="https://company.drweb.com/press/booklets/" class="block noneUnderline white paddXM paddTS paddBM paddLL _viewL_paddLM _viewL_paddRS _viewM_paddTM  _viewS_paddYM"&gt; Booklets &lt;/a&gt;                      
                    &lt;/div&gt;
              &lt;/div&gt;
      &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;!-- BLOCK_KNOW_MORE END --&gt;


</description></item><item><guid>https://news.drweb.com/show/?i=14149&amp;lng=en</guid><title>New versions now available: Dr.Web Security Space for Android 12.6.8 and Dr.Web Anti-virus Light for Android 11.5.4</title><link>https://news.drweb.com/show/?i=14149&amp;lng=en&amp;c=5</link><pubDate>Wed, 24 Feb 2021 02:00:00 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;February 24, 2021&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;newslead&gt;Russian anti-virus company Doctor Web has updated Dr.Web Security Space for Android to version 12.6.8 and Dr.Web Anti-virus Light for Android to version 11.5.4. The update delivers feature upgrades and resolves known software issues.&lt;/newslead&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Changes affecting both products:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;Adjustments have been made to ensure that the applications work properly on devices running Android 11;&lt;/li&gt;
	&lt;li&gt;An issue that could cause the applications to terminate abnormally while files were being downloaded has been resolved;&lt;/li&gt;
	&lt;li&gt;The maximum allowed file size for the files that users can submit for examination in the anti-virus laboratory has increased; &lt;/li&gt;
	&lt;li&gt;Other minor adjustments and tweaks have also been made.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Changes affecting Dr.Web Security Space for Android:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;An Anti-theft issue involving status updates for buddies requests has been resolved;&lt;/li&gt;
	&lt;li&gt;Adjustments have been made to ensure that the application works properly in centralised protection mode;&lt;/li&gt;
	&lt;li&gt;Also eliminated was an issue causing the Anti-theft to lock some device models whenever a system clean-up was initiated;&lt;/li&gt;
	&lt;li&gt;A defect causing the Anti-theft to lock devices on the system settings screen has been eliminated;&lt;/li&gt;
	&lt;li&gt;The update also changes the way the Anti-theft uses location data.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you downloaded the Dr.Web application from Google Play, the updates will be downloaded and installed automatically. If you’ve disabled automatic updating on your device, go to Google Play, select Dr.Web Security Space, Dr.Web Security Space Life or Dr.Web Anti-virus Light on the application list, and click "Update”.&lt;/p&gt;
&lt;p&gt;To update via the Doctor Web site, you need to download a new distribution file. If you’ve enabled the “New app version” option in the settings, a notification will be displayed whenever the virus databases are updated. You can start the download directly from this dialogue box. Important! Under Android 11, updating cannot be initiated from a dialogue box. To apply the update, you will need to download the latest application version manually.&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14145&amp;lng=en</guid><title>An increase in malware activity and other events of January 2021</title><link>https://news.drweb.com/show/?i=14145&amp;lng=en&amp;c=5</link><pubDate>Wed, 24 Feb 2021 15:55:21 GMT</pubDate><description>&lt;p&gt;February 24, 2021&lt;/p&gt;
&lt;p&gt;
  &lt;strong&gt;
    &lt;newslead&gt;Doctor Web presents its January 2021 overview of malware activity. In the first month of the year, the total number of detected threats increased by almost 5% compared to December. According to statistics, users primarily faced adware and malicious browser extensions. The most common threats in email traffic were various stealers and other malicious programs written in VB.NET. The number of user requests to decrypt files affected by encoders increased by almost a third. Read more about these and other events in our January review.&lt;/newslead&gt;
  &lt;/strong&gt;
&lt;/p&gt;

&lt;p class="alignCenter"&gt;&lt;a href="https://news.drweb.com/show/review/?i=14144&amp;lng=en" class="Btn Btn_big bg_main_green_5"&gt;&lt;span class="Btn-body icon icon_right" data-icon="#common-arrowRight"&gt;&lt;span class="Btn-text"&gt;Go to the review&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14143&amp;lng=en</guid><title>Threats on Google Play, banking trojans and other events in Dr.Web’s January 2021 mobile malware activity review</title><link>https://news.drweb.com/show/?i=14143&amp;lng=en&amp;c=5</link><pubDate>Wed, 24 Feb 2021 15:35:25 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;February 24, 2020&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;
  &lt;strong&gt;
    &lt;newslead&gt;Doctor Web presents its January 2021 mobile malware activity overview. Last month, the number of threats detected on Android devices decreased by 11.32% compared to December. Adware trojans, as well as malicious downloaders and trojans capable of executing arbitrary code remained most common threats.&lt;/newslead&gt;
  &lt;/strong&gt;
&lt;/p&gt;
&lt;p&gt;Throughout January, Doctor Web’s specialists uncovered new trojans and unwanted software spread on Google Play. Multifunctional trojans subscribing users to premium services, trojans designed to load scam websites, and apps with built-in adware modules were among them. Moreover, various banking trojans also attacked Android devices. Read more about these and other events in our January review.&lt;/p&gt;
&lt;p class="alignCenter"&gt;&lt;a href="https://news.drweb.com/show/review/?i=14142&amp;lng=en" class="Btn Btn_big bg_main_green_5"&gt;&lt;span class="Btn-body icon icon_right" data-icon="#common-arrowRight"&gt;&lt;span class="Btn-text"&gt;Go to the review&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14136&amp;lng=en</guid><title>Total security week: Get Dr.Web at up to 40% off!</title><link>https://news.drweb.com/show/?i=14136&amp;lng=en&amp;c=5</link><pubDate>Mon, 22 Feb 2021 05:00:00 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;February 22, 2021&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;newslead&gt;Doctor Web has great news for everyone seeking to protect their ever-increasing pool of devices from malware: from February 22-28, buy Dr.Web Security Space to protect 3 PCs/Macs for 1 year and pay just the 1 PC price—a 20 EUR saving.&lt;/newslead&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p class="alignCenter"&gt;
  &lt;img src="https://st.drweb.com/static/new-www/news/2021/february/3_PC_promotion_450_450.jpg?1" alt="#drweb"&gt;
&lt;/p&gt;

&lt;p&gt;This is a golden opportunity to ensure that all the desktops, laptops and mobile devices in your family can operate safely. Or, if you are in the habit of using multiple devices, you can cash in on this offer too. But it doesn't end there! Because Dr.Web is also a great gift!&lt;/p&gt;

&lt;p&gt;The standard one-year license price for 3 PCs is EUR 53.90, but only during this week, you can get all of Dr.Web’s state-of-the-art security features at up to 40% off.&lt;/p&gt;

&lt;p&gt;In addition to the 3 personal computers, 3 Android-powered devices will also enjoy reliable protection from all kinds of Internet threats, and 2 of the 3 PCs and all the gadgets will be protected free of charge. And if you choose to take advantage of this favourable moment to renew a Dr.Web license you already have (provided that its duration is three months or longer), you will also get an extra 150 days of protection completely for free. &lt;/p&gt;

&lt;p&gt;Please note that you can only purchase Dr.Web Security Space on these favourable terms on the special promo page on Doctor Web's site. Don't miss this special offer: &lt;/p&gt;

&lt;p class="alignCenter"&gt;
  &lt;a href="https://estore.drweb.com/promo?lng=en" class="Btn bg_main_green_5"&gt;
    &lt;span class="Btn-body icon icon_right" data-icon="#common-arrowRight"&gt;
      &lt;span class="Btn-text"&gt;Buy Dr.Web promo license&lt;/span&gt;
    &lt;/span&gt;
  &lt;/a&gt;
&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14146&amp;lng=en</guid><title>Join forces with Doctor Web to beta test new version of Dr.Web for business</title><link>https://news.drweb.com/show/?i=14146&amp;lng=en&amp;c=5</link><pubDate>Fri, 19 Feb 2021 12:24:54 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;February 19, 2021&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;newslead&gt;Russian anti-virus company Doctor Web is starting beta testing for version 13 of its Dr.Web Enterprise Security Suite—a corporate-grade anti-virus solution providing all-round end-point security and remote administration in networks of all sizes. In response to customer requests, version 13 incorporates features that allow for even better integration with process control systems, including critical infrastructures, which require a somewhat special approach to anti-virus security.&lt;/newslead&gt;&lt;/strong&gt;&lt;/p&gt;
 
&lt;p&gt;That being said, Doctor Web still strives to make its solutions as user-friendly as possible. With that in mind, public beta testing is now underway. Join the ranks of beta testers and grab this unique opportunity to interact directly with Dr.Web developers. See for yourself how the anti-virus is made and make a sizable contribution towards the creation of this flagship anti-virus solution for business.&lt;/p&gt;

&lt;p&gt;As customers eagerly await the upcoming release of Dr.Web Enterprise Security Suite 13.0, Doctor Web welcomes inquisitive beta testers and is already preparing gifts for the biggest contributors.&lt;/p&gt;

&lt;p&gt;Let's take a quick look at how Dr.Web Enterprise Security Suite 13.0 improves on its predecessors. &lt;/p&gt;

&lt;p&gt;In response to customer requests, version 13 incorporates features that allow for even better integration with process control systems, including critical infrastructures:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;The ability to allocate precisely the CPU and memory usage for the anti-virus scanner;&lt;/li&gt;
  &lt;li&gt;The option to lower the priority for tasks related to collecting additional information on protected hosts;&lt;/li&gt;
  &lt;li&gt;The ability to lower the bandwidth for connections between a proxy server and the centralised administration server.  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;All these features are particularly important for systems involved in various technological processes for which it is critical that a fast response time be maintained and CPU usage and the anti-virus’s memory footprint be kept to a minimum.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Easy to use.&lt;/b&gt; Dr.Web Enterprise Security Suite is packed with cutting-edge technologies, and all these state-of-the art features are actually easy to control—thanks to the Control Center. Your vast network may connect computers in multiple branch offices (as is the case with Russia’s country-wide election infrastructure, which Dr.Web has been protecting for years). Version 13 also incorporates innovations that will benefit system administrators. Thanks to the new layout in the Control Center's anti-virus network view, managing a large number of objects has gotten easier.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Available across multiple platforms.&lt;/b&gt; Compatibility with various versions of Windows and Linux, as well as with macOS, is another major advantage of Dr.Web. A protected infrastructure may connect all sorts of computers running different operating systems. And, whereas previously Dr.Web was only easy and quick to deploy under Windows, version 13 boasts easy deployment options for Linux as well. Installing and managing the anti-virus software on protected hosts is now much easier. Dr.Web Agent can be installed on Linux machines via the Control Center or using a special utility.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Flexible settings.&lt;/b&gt; With the Dr.Web Control Center, protected hosts can be organised in groups matching the actual structure of your company. And then the anti-virus software can be fine-tuned for each of these groups. The system administrator can also take advantage of Office Control and determine which sites and network resources should be available to the employees in each specific group.  In version 13, Office Control lets you manage settings for each user group and control which removable media are accessible on user computers. You can also take advantage of an extended list of unwanted site categories to prevent employees from visiting certain sites.&lt;/p&gt;

&lt;p&gt;All in all, the new Dr.Web Enterprise Security Suite version is packed with new features, tweaks, and upgrades. You can find more information about version 13 &lt;a href="https://news.drweb.com/show/?i=14147&amp;lng=en" target="_blank"&gt;here&lt;/a&gt;: And all these innovations are highly anticipated by users and make this solution even more appealing to prospective customers. With this in mind, Doctor Web is committed to ensuring that before the official release date, all the features work exactly as expected, the user experience is completely trouble-free, and any shortcomings are discovered and corrected.  Therefore, we invite all users to test this innovative solution, and we look forward to hearing what you like and don't like about the new version and what you think Doctor Web can do to make it even better. And, as is customary, the most active contributors are in for a reward. This time around the five most active beta testers will receive Dr.Web-branded hoodies!&lt;/p&gt;

&lt;p&gt;To beta test Dr.Web Enterprise Security Suite 13.0, follow this link:&lt;a href="https://beta.drweb.com/?lng=en" target="_blank"&gt;https://beta.drweb.com/?lng=en&lt;/a&gt;. Please note that registration is required to access the beta section of our website.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://products.drweb.com/enterprise_security_suite/?lng=en" target="_blank"&gt;More information on Dr.Web Enterprise Security &lt;/a&gt;&lt;/p&gt;.</description></item><item><guid>https://news.drweb.com/show/?i=14141&amp;lng=en</guid><title>Components updated in Dr.Web 12.0 products for Windows</title><link>https://news.drweb.com/show/?i=14141&amp;lng=en&amp;c=5</link><pubDate>Wed, 17 Feb 2021 09:41:47 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;17 February 2021&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;newslead&gt;Russian anti-virus company Doctor Web has updated Lua-script for updater (12.5.0.01280 and 12.10.0.01290) in Dr.Web Security Space 12.0, Dr.Web Anti-virus 12.0 and Dr.Web Anti-virus for Windows Servers. Furthermore, Dr.Web Security Space setup (12.10.4.01281) has been updated in Dr.Web Security Space 12.0; and Anti-virus for Windows setup (12.10.4.01281) and Anti-virus for Windows servers setup (12.10.4.01281) have been made current in Dr.Web Anti-virus 12.0 and Dr.Web 12.0 for Windows Servers, respectively.&lt;/newslead&gt; The update delivers fixes for identified issues, as well as the latest versions of the product documentation, and ensures that Dr.Web software cannot be installed on Windows PCs that do not support SHA-256. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Changes made to Lua-script for updater:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;On Windows Vista, Windows 7, and Windows Server 2008/2008R2 computers, Dr.Web software components, except the virus databases, can no longer be updated (even via an update mirror) if OS system updates ensuring SHA-256 support have not been installed on them.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Changes made to Dr.Web Security Space setup, Anti-virus for Windows setup and Anti-virus for Windows servers setup:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;Dr.Web Security Space 12.0 and Dr.Web Anti-virus 12.0 can no longer be installed under Windows Vista and Windows 7, and Dr.Web Anti-virus 12.0 for Windows Servers cannot be installed under Windows Server 2008/2008R2 if an operating system update providing SHA-256 support has not been installed; &lt;/li&gt;
	&lt;li&gt;An issue that might prevent the applications from being installed from a network drive has been fixed;&lt;/li&gt;
	&lt;li&gt;Also resolved was a defect causing the Modify and Remove setup dialogue to use a different language (other than the current application language).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The user guides for Dr.Web Security Space 12.0 and Dr.Web Anti-virus 12.0, as well as the administrator manual for Dr.Web Anti-virus 12.0 for Windows Servers, have also been updated.&lt;/p&gt;
&lt;p&gt;The update will be downloaded and installed automatically. The changes, which resolve the network drive installation issue and make it impossible to install the software in systems lacking SHA-256 support, will take affect after the respective software distributions are updated.&lt;/p&gt;
&lt;p&gt;Important: to ensure that the Dr.Web software operates correctly under Windows Vista, Windows 7, Windows Server 2008 or Windows Server 2008 R2, Microsoft security updates providing SHA-256 support must be installed in the systems. For additional information, please refer to this &lt;a href="https://support.drweb.ru/sha2/"&gt;guide&lt;/a&gt;.&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14139&amp;lng=en</guid><title>Dr.Web CureIt! updated</title><link>https://news.drweb.com/show/?i=14139&amp;lng=en&amp;c=5</link><pubDate>Wed, 17 Feb 2021 01:00:00 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;February 17, 2021&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;newslead&gt;Russian anti-virus company Doctor Web has updated its curing utility Dr.Web CureIt!&lt;/newslead&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The utility now uses the latest versions of Dr.Web Scanning Engine (12.6.2.202011180) and Dr.Web Anti-rootkit API (12.5.18.202101211).&lt;/p&gt;
&lt;p&gt;&lt;a href="https://free.drweb.com/cureit/?lng=en"&gt;Download Dr.Web CureIt!&lt;/a&gt;&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14137&amp;lng=en</guid><title>Components updated in Dr.Web 11.1 products for Unix-like systems</title><link>https://news.drweb.com/show/?i=14137&amp;lng=en&amp;c=5</link><pubDate>Fri, 12 Feb 2021 02:00:00 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;February 16, 2021&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;newslead&gt;Russian anti-virus company Doctor Web has updated a number of modules in Dr.Web 11.1 products for Unix-like systems. The updated modules include drweb-cloudd (11.1.5-2012181751), drweb-configd (11.1.11-2102021643), drweb-ctl (11.1.8-2101211803), drweb-documentation (11.1.3-2102021301), drweb-engine (11.1.3-2101221231), drweb-filecheck (11.1.6-2012181657), drweb-libs (11.1.4-2012291813), drweb-meshd (11.1.3-2012181751), drweb-netcheck (11.1.4-2012181657), drweb-clamd (11.1.2-2012181751), drweb-rpm (11.1.4-2101152052), drweb-rpm-libs7 (11.1.4-2101152052), drweb-se (11.1.4-2012301926), drweb-statd (11.1.5-2012181751), drweb-update (11.1.6-2012181656), drweb-zypper (11.1.3-2010281214), drweb-httpd (11.1.6-2012181514), drweb-httpd-bin (11.1.6-2012181514), drweb-firewall (11.1.5-2012181514), drweb-gated (11.1.5-2012181514), drweb-configure (11.1.2-2010051243), drweb-spider (11.1.2-2012181751), drweb-spider-kmod (11.1.2-2012161527), drweb-lookupd (11.1.3-2012181751), drweb-maild (11.1.10-2101211331), drweb-gui (11.1.8-2012181751), drweb-qt (11.1.4-2012291813), drweb-session (11.1.5-2101121525), drweb-uninst (11.1.2-2101272149), drweb-icapd (11.1.6-2012181514) and drweb-smbspider-daemon (11.1.2-2012181751).&lt;/newslead&gt; The update introduces new features, resolves known issues, and delivers minor upgrades.&lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Changes affecting Dr.Web Anti-virus 11.1 for Unix Mail Servers, Dr.Web Anti-virus 11.1 for Linux, Dr.Web Anti-virus 11.1 for Unix Server and Dr.Web Anti-virus 11.1 for Internet gateways Unix&lt;/h3&gt;
&lt;p&gt;drweb-cloudd and drweb-update:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;The modules' manual has been updated.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;drweb-configd:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;An issue affecting the formation of drweb-linuxfirewall rules when external data sources were used has been resolved&lt;/li&gt;
	&lt;li&gt;Component integrity validation routines have been optimised.&lt;/li&gt;
	&lt;li&gt;The modules drweb-gated and drweb-maild can now be used more efficiently while the virus databases are being updated;&lt;/li&gt;
	&lt;li&gt;The software now runs more efficiently in ES-mode in systems using the ARM64 architecture;&lt;/li&gt;
	&lt;li&gt;Routines determining the certificate store location have been optimised;&lt;/li&gt;
	&lt;li&gt;An issue causing the "" value for time and size parameters to be interpreted as zero has been resolved;&lt;/li&gt;
	&lt;li&gt;Command line help information is now more concise;&lt;/li&gt;
	&lt;li&gt;Also resolved was a defect causing incorrect drweb-httpd status information to appear under certain circumstances;&lt;/li&gt;
	&lt;li&gt;An issue that might cause drweb-configd to terminate abnormally has been addressed.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;drweb-ctl:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;Now the drweb-ctl rawscan command can be used in centralised protection mode;&lt;/li&gt;
	&lt;li&gt;The MaxSizeToExtract option is available for scanning commands;&lt;/li&gt;
	&lt;li&gt;The drweb-ctl output now includes additional information;&lt;/li&gt;
	&lt;li&gt;A command enabling users to check drweb-lookupd parameters has been added;&lt;/li&gt;
	&lt;li&gt;The software now checks whether a password has been specified whenever a server connection is being established or a new group member is being added;&lt;/li&gt;
	&lt;li&gt;Also addressed was an issue that might prevent users from logging in under Linux Solus after Dr.Web for Linux had been installed. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;drweb-engine:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;The anti-virus engine version has been updated.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;drweb-filecheck:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;The MaxSizeToExtract option is available for scanning commands.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;drweb-meshd:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;The UDP broadcast method can now be used to look for a MeshD server;&lt;/li&gt;
	&lt;li&gt;The IPv6 protocol is now supported.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;drweb-netcheck:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;Now only basic information is logged at the INFO level.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Changes affecting Dr.Web 11.1 for Unix Mail Servers, Dr.Web 11.1 for Unix Server, and Dr.Web Anti-virus 11.1 for Internet gateways Unix&lt;/h3&gt;
&lt;p&gt;drweb-clamd:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;The module’s manual has been updated.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;drweb-httpd and drweb-httpd-bin:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;The web-console now works properly while the virus databases are being updated.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Changes affecting Dr.Web 11.1 for Unix Mail Servers, Dr.Web 11.1 for Linux, and Dr.Web Anti-virus 11.1 for Internet gateways Unix&lt;/h3&gt;
&lt;p&gt;drweb-gated:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;An issue that might prevent malicious code from being detected in a message body has been resolved;&lt;/li&gt;
	&lt;li&gt;Routines facilitating communication with drweb-maild have been optimised;&lt;/li&gt;
	&lt;li&gt;The component can now interact with drweb-urlcheck.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Changes affecting Dr.Web 11.1 for Unix Mail Servers and Dr.Web Anti-virus 11.1 for Linux&lt;/h3&gt;
&lt;p&gt;drweb-maild:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;SPF (Server Policy Framework) verification is now available;&lt;/li&gt;
	&lt;li&gt;Support has been added for a new cryptographic signature method (RFC 8463) for DomainKeys Identified Mail;&lt;/li&gt;
	&lt;li&gt;Recompression routines have been optimised for emails containing threats;&lt;/li&gt;
	&lt;li&gt;The application logs now provide more detailed information;&lt;/li&gt;
	&lt;li&gt;Now lua api can be used to facilitate SPF (Server Policy Framework) verification.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Changes made to Dr.Web Anti-virus for Linux and Dr.Web for UNIX Server&lt;/h3&gt;
&lt;p&gt;drweb-spider:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;The module’s manual has been updated.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;drweb-spider-kmod:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;Adjustments have been made to make the software compatible with Astra Linux SE.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Changes affecting Dr.Web 11.1 for Unix Mail Servers and Dr.Web Anti-virus 11.1 for Internet gateways Unix&lt;/h3&gt;
&lt;p&gt;drweb-lookupd:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;The module’s manual has been updated.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Changes affecting Dr.Web Anti-virus 11.1 for Linux&lt;/h3&gt;
&lt;p&gt;drweb-session:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;An issue preventing Linux SpIDer from detecting threats on PCs running Astra Linux SE if the user was logged into the system using the lowest security clearance.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Changes affecting Dr.Web 11.1 for Internet gateways Unix:&lt;/h3&gt;
&lt;p&gt;drweb-icapd:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;The module’s manual has been updated.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Changes affecting Dr.Web Anti-virus 11.1 for Unix Server&lt;/h3&gt;
&lt;p&gt;drweb-smbspider-daemon:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;The module’s manual has been updated.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The update is performed via the Dr.Web repository. If you encounter any problems when updating, please use the instructions from &lt;a href="https://news.drweb.com/show/?i=13332&amp;lng=en"&gt;our previous news post&lt;/a&gt; to specify the additional repository for the Dr.Web software you’re using.&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14135&amp;lng=en</guid><title>Dr.Web Mobile Control Center for Android updated to version 13.0.0</title><link>https://news.drweb.com/show/?i=14135&amp;lng=en&amp;c=5</link><pubDate>Thu, 11 Feb 2021 01:00:00 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;February 11, 2021&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;newslead&gt;Russian anti-virus company Doctor Web has updated its Dr.Web Mobile Control Center for Android to version 13.0.0. The update provides support for the latest Android and Dr.Web AV-Desk versions, delivers new features and resolves known software issues.&lt;/newslead&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Changes made to the Mobile Control Center:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Android 11 is now supported;&lt;/li&gt;
&lt;li&gt;Support for Dr.Web AV-Desk 13.0 has been added;&lt;/li&gt;
&lt;li&gt;Dr.Web AV-Desk documentation in PDF format can now be viewed on the server;&lt;/li&gt;
&lt;li&gt;The server drop-down list now also displays information about the connection protocols being used (HTTP or HTTPS) and the current user login;&lt;/li&gt;
&lt;li&gt;A Network window display issue has been resolved;&lt;/li&gt;
&lt;li&gt;Corrections have been made to the Mobile Control Center's message texts.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Go to &lt;a href="https://play.google.com/store/apps/details?id=com.drweb.mcc" target="_blank" rel="noopener noreferrer"&gt;Google Play&lt;/a&gt; to download the Dr.Web Mobile Control Center for Android for free and to learn about its features.&lt;/p&gt;</description></item></channel></rss>
