{"id":13695,"date":"2018-10-29T08:10:04","date_gmt":"2018-10-29T16:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/10\/29\/news-7462\/"},"modified":"2018-10-29T08:10:04","modified_gmt":"2018-10-29T16:10:04","slug":"news-7462","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/10\/29\/news-7462\/","title":{"rendered":"Mobile Menace Monday: top five scariest mobile threats"},"content":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Mon, 29 Oct 2018 15:00:00 +0000<\/strong><\/p>\n<p>In the <em>spirit <\/em>of this upcoming Halloween season, we thought we&#8217;d provide you with a list of the top five scariest mobile threats in our book.<\/p>\n<p>The list is organized from least to most haunting, based on my own humble opinion gathered from several years as a mobile threat researcher. Of course, my opinion has also been formed by the data we&#8217;ve collected within the last few months that shows which threats have been terrorizing customers the most. Without further ado, these are the top threats that haunt my dreams.<\/p>\n<h3>5) The clinking of locks and chains<\/h3>\n<p>Although not the most prevalent mobile malware (thank goodness), <a href=\"https:\/\/blog.malwarebytes.com\/threats\/mobile-ransomware\/\" target=\"_blank\" rel=\"noopener\">mobile ransomware&#8217;s<\/a> nastiness will give you the chills. It starts by tricking users into giving away their device administrator rights.\u00a0 Afterwards, the ransomware offers a\u00a0<em>treat <\/em>of locking the device from any use unless you pay a ransom.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26110\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/mobile-menace-monday-top-five-scariest-mobile-threats\/attachment\/ransomware_monster-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/RANSOMWARE_monster.jpg\" data-orig-size=\"3030,3833\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"RANSOMWARE_monster\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/RANSOMWARE_monster-237x300.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/RANSOMWARE_monster-474x600.jpg\" class=\"aligncenter wp-image-26110\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/RANSOMWARE_monster-474x600.jpg\" alt=\"\" width=\"401\" height=\"509\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/RANSOMWARE_monster-474x600.jpg 474w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/RANSOMWARE_monster-237x300.jpg 237w\" sizes=\"auto, (max-width: 401px) 100vw, 401px\" \/><\/p>\n<p>Even scarier, some <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/05\/cyber-police-android-ransomware-still-on-patrol\/\" target=\"_blank\" rel=\"noopener\">mobile ransomware threatens prosecution by law enforcement<\/a>, claiming illegal activities have been conducted on the device. This is all a hoax, as law enforcement would never request paying a <em>fine<\/em> through payment methods like Bitcoin or gift cards. The most popular mobile ransomware family is detected by Malwarebytes as Android\/Ransom.SLocker.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26103\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/mobile-menace-monday-top-five-scariest-mobile-threats\/attachment\/1-54\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/1.jpg\" data-orig-size=\"454,727\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;A&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1399467561&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/1-187x300.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/1-375x600.jpg\" class=\"aligncenter size-medium wp-image-26103\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/1-187x300.jpg\" alt=\"\" width=\"187\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/1-187x300.jpg 187w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/1-375x600.jpg 375w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/1.jpg 454w\" sizes=\"auto, (max-width: 187px) 100vw, 187px\" \/><\/p>\n<h3>4) Guerrilla warfare<\/h3>\n<p>As a mobile researcher, it sometimes feels like a war out there. This is especially true with the mobile malware\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/detections\/android-trojan-guerrilla\/\" target=\"_blank\" rel=\"noopener\">Android\/Trojan.Guerrilla<\/a>. Guerrilla warfare can be described as irregular, which sums up this Guerrilla\u2019s tactics of obfuscating malware scanners. Infections usually come with multiple variants of Guerrilla running on the device. However, for every move they make, we have a counter move. The war is never-ending.<\/p>\n<p>&nbsp;<\/p>\n<h3>3) Dashing from ghosts?\u00a0 No, to the top of detections list!<\/h3>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/detections\/android-adware-mobidash\/\" target=\"_blank\" rel=\"noopener\">Android\/Adware.MobiDash<\/a> will make your skin crawl! It\u2019s one most highly-detected threats we\u2019ve seen on customers&#8217; Android devices! As if possessed, MobiDash goes above and beyond the typical low-level adware. It starts by sneaking its way into getting device administration rights.\u00a0 Once given, the user will be doomed with ads on his lock screen.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26111\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/mobile-menace-monday-top-five-scariest-mobile-threats\/attachment\/adware-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/adware.jpg\" data-orig-size=\"1599,1635\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"adware\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/adware-293x300.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/adware-587x600.jpg\" class=\"aligncenter wp-image-26111\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/adware-587x600.jpg\" alt=\"\" width=\"436\" height=\"446\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/adware-587x600.jpg 587w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/adware-293x300.jpg 293w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/adware.jpg 1599w\" sizes=\"auto, (max-width: 436px) 100vw, 436px\" \/><\/p>\n<p>Good luck uninstalling, as some versions are especially good at\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/07\/mobile-menace-monday-adware-mobidash-gets-stealthy\/\" target=\"_blank\" rel=\"noopener\">hiding themselves in plain sight<\/a>!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26104\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/mobile-menace-monday-top-five-scariest-mobile-threats\/attachment\/2-43\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/2.png\" data-orig-size=\"720,1280\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/2-169x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/2-338x600.png\" class=\"aligncenter size-medium wp-image-26104\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/2-169x300.png\" alt=\"\" width=\"169\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/2-169x300.png 169w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/2-338x600.png 338w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/2.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/p>\n<h3>2) Lurking in the shadows\u2026of code!<\/h3>\n<p>Another high-ranking threat found on customer\u2019s Android devices, <a href=\"https:\/\/blog.malwarebytes.com\/detections\/android-trojan-hiddenads-bira\/\" target=\"_blank\" rel=\"noopener\">Android\/Trojan.HiddenAds<\/a>, is a smooth criminal. Also known as Android\/Trojan.Hiddad, its haunting ability to effectively hide its malicious code is terrifying! In fact, it often bypasses <a href=\"https:\/\/www.android.com\/play-protect\/\" target=\"_blank\" rel=\"noopener\">Google Play Protect<\/a>&#8216;s verification system.\u00a0 Thus, <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/mobil'e-menace-monday-bike-race-hidden-ads-now-play\/\" target=\"_blank\" rel=\"noopener\">apps infected with HiddenAds make it onto the Play Store.<\/a>\u00a0After installing on a device, periodic full-screen ads will haunt you!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26105\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/mobile-menace-monday-top-five-scariest-mobile-threats\/attachment\/3-35\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/3.png\" data-orig-size=\"720,1280\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"3\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/3-169x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/3-338x600.png\" class=\"aligncenter size-medium wp-image-26105\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/3-169x300.png\" alt=\"\" width=\"169\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/3-169x300.png 169w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/3-338x600.png 338w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/3.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/p>\n<h3>1) The one that keeps me up at night: Adups<\/h3>\n<p>Seriously, I have lost sleep over this one. Adups and I have a long history:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/11\/mobile-menace-monday-adups-old-and-new\/\" target=\"_blank\" rel=\"noopener\">Mobile Menace Monday: Adups, old and new<\/a><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/12\/mobile-menace-monday-upping-the-ante-on-adups-fwupgradeprovider\/\" target=\"_blank\" rel=\"noopener\">Mobile Menace Monday: upping the ante on Adups<\/a><\/p>\n<p>Adups comes in many forms, but the most prevalent is Android\/PUP.Riskware.Autoins.Fota. This variant can potentially auto install malware like Android\/Trojan.Guerrilla, and Android\/Trojan.HiddenAds. As addressed in the blogs linked above, it\u2019s a preinstalled system app(s). Thus, it cannot be uninstalled through the device\u2019s information page, only disabled.\u00a0 However, the nightmare gets worse\u2014Adups can\u2019t even be disabled. Not even a mobile scanner can remove or disable it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26112\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/mobile-menace-monday-top-five-scariest-mobile-threats\/attachment\/trojan-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Trojan.jpg\" data-orig-size=\"1568,1704\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Trojan\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Trojan-276x300.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Trojan-552x600.jpg\" class=\"aligncenter wp-image-26112\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Trojan-552x600.jpg\" alt=\"\" width=\"409\" height=\"445\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Trojan-552x600.jpg 552w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Trojan-276x300.jpg 276w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Trojan.jpg 1568w\" sizes=\"auto, (max-width: 409px) 100vw, 409px\" \/><\/p>\n<p>So how do we deal with this <em>Freddy Krueger<\/em> of a mobile threat? Well, you\u2019re going to have to defeat it in a different realm: the realm of ADB command line tools, a part of Google\u2019s <a href=\"https:\/\/developer.android.com\/studio\/index.html\" target=\"_blank\" rel=\"noopener\">Android Studio<\/a>. Luckily, we found a wake to wake up from the nightmare, as we recently updated a guide on <a href=\"https:\/\/forums.malwarebytes.com\/topic\/216616-removal-instructions-for-adups\/\" target=\"_blank\" rel=\"noopener\">how to fully uninstall (not just disable) Adups.<\/a>\u00a0Beware, though, this tutorial is not for the faint of heart, and only recommended for advanced users.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26106\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/mobile-menace-monday-top-five-scariest-mobile-threats\/attachment\/4-24\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/4.png\" data-orig-size=\"720,135\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"4\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/4-300x56.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/4-600x113.png\" class=\"aligncenter size-medium wp-image-26106\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/4-300x56.png\" alt=\"\" width=\"300\" height=\"56\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/4-300x56.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/4-600x113.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/4.png 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<h3>Safe room<\/h3>\n<p>When the <em>boogie men <\/em>of mobile threats try to break through the walls, we have a <em>safe room<\/em> for you:\u00a0<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.malwarebytes.antimalware\" target=\"_blank\" rel=\"noopener\">Malwarebytes for Android<\/a> keeps the scariest mobile threats at bay! Stay safe out there!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/mobile-menace-monday-top-five-scariest-mobile-threats\/\">Mobile Menace Monday: top five scariest mobile threats<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/mobile-menace-monday-top-five-scariest-mobile-threats\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Mon, 29 Oct 2018 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/mobile-menace-monday-top-five-scariest-mobile-threats\/' title='Mobile Menace Monday: top five scariest mobile threats'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Featured_Spookiest-Mobile-Malware.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>In the spirit of this upcoming Halloween season, we thought we&#8217;d provide you with a list of the top five scariest mobile threats in our book.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/mobile\/\" rel=\"category tag\">Mobile<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/adups\/\" rel=\"tag\">adups<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android-ransomware\/\" rel=\"tag\">android ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/guerrilla\/\" rel=\"tag\">guerrilla<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hidden-ads\/\" rel=\"tag\">Hidden Ads<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobidash\/\" rel=\"tag\">mobidash<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-menace-monday\/\" rel=\"tag\">mobile menace monday<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-ransomware\/\" rel=\"tag\">mobile ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-threats\/\" rel=\"tag\">mobile threats<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/triple-m\/\" rel=\"tag\">triple m<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/mobile-menace-monday-top-five-scariest-mobile-threats\/' title='Mobile Menace Monday: top five scariest mobile threats'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/mobile-menace-monday-top-five-scariest-mobile-threats\/\">Mobile Menace Monday: top five scariest mobile threats<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[16993,10462,12522,4503,19961,18627,19020,10554,10555,11256,19962,10556],"class_list":["post-13695","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adups","tag-android","tag-android-ransomware","tag-cybercrime","tag-guerrilla","tag-hidden-ads","tag-mobidash","tag-mobile","tag-mobile-menace-monday","tag-mobile-ransomware","tag-mobile-threats","tag-triple-m"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13695"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13695\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13695"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}