<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybersecurity &#8211; Bitfinance</title>
	<atom:link href="https://bitfinance.news/en/etiqueta/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://bitfinance.news</link>
	<description>Fintech &#38; new economy info</description>
	<lastBuildDate>Tue, 28 Apr 2026 09:29:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://bitfinance.news/wp-content/uploads/2025/01/favicon-64.png</url>
	<title>cybersecurity &#8211; Bitfinance</title>
	<link>https://bitfinance.news</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>ESET Venezuela: A cyberattack occurs every 39 seconds; prevention reduces downtime costs by up to 97 %</title>
		<link>https://bitfinance.news/en/eset-venezuela-a-cyberattack-occurs-every-39-seconds-prevention-reduces-downtime-costs-by-up-to-97/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Sun, 26 Apr 2026 12:00:52 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Carlos López Rodríguez]]></category>
		<category><![CDATA[cyber scams]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Digital Prevention]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[José Luis Rangel]]></category>
		<category><![CDATA[Martina López]]></category>
		<category><![CDATA[prudence]]></category>
		<category><![CDATA[Safeguarding]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Technology in Venezuela]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=121107</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="871" height="518" src="https://bitfinance.news/wp-content/uploads/2026/04/A-Referencial-principal.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="La madurez digital exige políticas de respuesta ante el fraude psicológico y fallas técnicas. Eficiencia en la gestión de riesgos y la adopción de estándares globales son las únicas barreras capaces de evitar la parálisis total de un negocio tras un ataque" decoding="async" fetchpriority="high" srcset="https://bitfinance.news/wp-content/uploads/2026/04/A-Referencial-principal.jpg 871w, https://bitfinance.news/wp-content/uploads/2026/04/A-Referencial-principal-300x178.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/04/A-Referencial-principal-768x457.jpg 768w" sizes="(max-width: 871px) 100vw, 871px" /></div><p>In a digital environment where threats are relentless, national productive sectors face a critical scenario: an attempted cyber intrusion every minute. Given this reality, analyzed by ESET Venezuela experts during their 7th Technology Breakfast for Journalists, data protection has ceased to be a technical option and has become a priority for economic survival. Today, efficient [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/eset-venezuela-a-cyberattack-occurs-every-39-seconds-prevention-reduces-downtime-costs-by-up-to-97/">ESET Venezuela: A cyberattack occurs every 39 seconds; prevention reduces downtime costs by up to 97 %</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="871" height="518" src="https://bitfinance.news/wp-content/uploads/2026/04/A-Referencial-principal.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="La madurez digital exige políticas de respuesta ante el fraude psicológico y fallas técnicas. Eficiencia en la gestión de riesgos y la adopción de estándares globales son las únicas barreras capaces de evitar la parálisis total de un negocio tras un ataque" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/04/A-Referencial-principal.jpg 871w, https://bitfinance.news/wp-content/uploads/2026/04/A-Referencial-principal-300x178.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/04/A-Referencial-principal-768x457.jpg 768w" sizes="(max-width: 871px) 100vw, 871px" /></div><p style="text-align: justify;">In a digital environment where threats are relentless, national productive sectors face a <strong>critical scenario: an attempted cyber intrusion every minute.</strong> Given this reality, analyzed by <a href="https://www.eset.com/ec/" target="_blank" rel="noopener">ESET Venezuela</a> experts during their <strong>7th Technology Breakfast for Journalists</strong>, data protection has ceased to be a technical option and has become <strong>a priority for economic survival.</strong></p>
<p style="text-align: justify;">Today, efficient risk management and the adoption of global standards are the only barriers capable of preventing a complete business shutdown.</p>
<p style="text-align: justify;">During this high-level meeting<strong>, emerging trends that are redefining the protection of digital assets were explored.</strong> Special emphasis was placed on how local <strong>organizations must adapt their infrastructures in the face of the increase in sophisticated attacks that jeopardize operations and data integrity</strong> in an increasingly interconnected and demanding ecosystem.</p>
<p style="text-align: justify;"><strong>Michele Flammia, General Manager</strong> of <a href="https://www.instagram.com/eset_ve/" target="_blank" rel="noopener">ESET Venezuela</a>, welcomed attendees, highlighting the brand&#8217;s commitment to digital education and protecting strategic assets against current challenges.</p>
<h3 style="text-align: left;">Alarming figures that drive proactive action</h3>
<p><img decoding="async" class="alignnone wp-image-121102 size-full" src="https://bitfinance.news/wp-content/uploads/2026/04/B-Para-acompanar-texto.jpeg" alt="" width="1010" height="605" srcset="https://bitfinance.news/wp-content/uploads/2026/04/B-Para-acompanar-texto.jpeg 1010w, https://bitfinance.news/wp-content/uploads/2026/04/B-Para-acompanar-texto-300x180.jpeg 300w, https://bitfinance.news/wp-content/uploads/2026/04/B-Para-acompanar-texto-768x460.jpeg 768w" sizes="(max-width: 1010px) 100vw, 1010px" /></p>
<p style="text-align: justify;"><strong>Carlos López Rodríguez, the company&#8217;s Support and Training Manager,</strong> emphasized that <strong>cybersecurity must be viewed as an ongoing process:</strong> &#8220;Prevention and training cost less than stopping an attack once it has begun.&#8221; He also emphasized that certifications and work on control frameworks provide a real guarantee to third parties and clients.</p>
<p style="text-align: justify;">For his part, <strong>José Luis Rangel, Commercial Manager of ESET,</strong> warned about the lack of visibility in the market: “Almost 40 % of companies don&#8217;t know if they are currently being compromised or if they were in the past.”</p>
<p style="text-align: justify;"><img decoding="async" class="alignnone wp-image-121105 size-full" src="https://bitfinance.news/wp-content/uploads/2026/04/C-Para-acompanar-texto.jpg" alt="" width="1122" height="543" srcset="https://bitfinance.news/wp-content/uploads/2026/04/C-Para-acompanar-texto.jpg 1122w, https://bitfinance.news/wp-content/uploads/2026/04/C-Para-acompanar-texto-300x145.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/04/C-Para-acompanar-texto-1024x496.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/04/C-Para-acompanar-texto-768x372.jpg 768w" sizes="(max-width: 1122px) 100vw, 1122px" /></p>
<p style="text-align: justify;">According to experts, <strong>a cyberattack occurs worldwide every 39 seconds, making it a statistically more likely threat than a fire.</strong> The economic impact of this operational paralysis can be reduced by up to 97% with adequate investment in training and frameworks such as ISO 27001 or NIST.</p>
<h3 style="text-align: left;">The human factor and social engineering</h3>
<p style="text-align: justify;"><strong>Martina López, a cybersecurity researcher at ESET Latin America,</strong> highlighted that social <strong>engineering remains the primary entry point for criminals.</strong> Using techniques like <strong>quishing</strong> (QR phishing) and <strong>dynamic phishing</strong>, attackers exploit the sense of urgency and trust of employees. In the country, the most frequently impersonated entities include <strong>DocuSign, MetaMask, and the Telegram platform,</strong> taking advantage of peak interest in AI tools and the current national situation.</p>
<h3 style="text-align: left;">Key recommendations for resilience</h3>
<p style="text-align: justify;">To strengthen defenses, specialists suggest three fundamental pillars:</p>
<ul style="text-align: justify;">
<li><strong>Tabletop Drills:</strong> Practicing crisis scenarios allows for the identification of weaknesses in response protocols before a real disaster occurs.</li>
<li><strong>Real Certification:</strong> Obtaining third-party endorsements that validate international standards provides real trust and security to clients.</li>
<li><strong>Device Security:</strong> Disable notifications on the lock screen to prevent the theft of passwords or credentials and always enable two-factor authentication (2FA).</li>
</ul>
<p style="text-align: justify;">Cybersecurity requires operational maturity; it is contradictory to fear quantum computing while working with obsolete systems. As López concluded, “training and practicing will always cost less than stopping a cyber intruder&#8217;s operation once it has begun.”</p>
<h3 style="text-align: left;">Video coverage with more details</h3>
<p><iframe loading="lazy" title="ESET Venezuela: Cada 39 segundos ocurre un ciberataque" width="1170" height="658" src="https://www.youtube.com/embed/1sowK2buKTM?wmode=transparent&amp;rel=0&amp;feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p style="text-align: left;">For more information, visit the ESET website: <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>. Also, follow them on social media: Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p style="text-align: left;"><em>Through on-site coverage and information from ESET and <a href="https://www.comstatrowland.com/" target="_blank" rel="noopener">Comstat Rowland</a> Comunicaciones Estratégicas Integrales</em></p>
<p style="text-align: left;">Audiovisual production: Ida Febres</p>
<p style="text-align: left;"><em><strong>Follow our news on Google!</strong></em><em> For current, interesting, and accurate information, </em><a href="https://www.google.com/search?q=site:bitfinance.news&amp;tbm=nws&amp;tbs=sbd:1" target="_blank" rel="noopener"><strong><em>click here</em></strong></a><em> to see all the content on <strong>Bitfinance.news</strong>. You can also find us on </em><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong><em>X/Twitter</em></strong></a><em> and </em><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong><em>Instagram</em></strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/eset-venezuela-a-cyberattack-occurs-every-39-seconds-prevention-reduces-downtime-costs-by-up-to-97/">ESET Venezuela: A cyberattack occurs every 39 seconds; prevention reduces downtime costs by up to 97 %</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Rafael Núñez from Computer Weekly: Mythos, the new cyber intelligence that accelerates the security cycle</title>
		<link>https://bitfinance.news/en/rafael-nunez-from-computer-weekly-mythos-the-new-cyber-intelligence-that-accelerates-the-security-cycle/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 20:00:05 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[Computer Weekly]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[IT security expert]]></category>
		<category><![CDATA[MásQueSeguridad (MQS)]]></category>
		<category><![CDATA[Mythos]]></category>
		<category><![CDATA[Rafael Núñez Aponte]]></category>
		<category><![CDATA[technically disruptive]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=120952</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1920" height="1080" src="https://bitfinance.news/wp-content/uploads/2026/04/steve-a-johnson-_0iV9LmPDn0-unsplash.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Lo que describen es técnicamente disruptivo" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/04/steve-a-johnson-_0iV9LmPDn0-unsplash.jpg 1920w, https://bitfinance.news/wp-content/uploads/2026/04/steve-a-johnson-_0iV9LmPDn0-unsplash-300x169.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/04/steve-a-johnson-_0iV9LmPDn0-unsplash-1024x576.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/04/steve-a-johnson-_0iV9LmPDn0-unsplash-768x432.jpg 768w, https://bitfinance.news/wp-content/uploads/2026/04/steve-a-johnson-_0iV9LmPDn0-unsplash-1536x864.jpg 1536w" sizes="(max-width: 1920px) 100vw, 1920px" /></div><p>In the prestigious specialized publication Computer Weekly, Venezuelan expert Rafael Núñez Aponte, director of MásQue Seguridad, shares his insightful and high-level opinions on Mythos, the new cyber intelligence that accelerates the IT security cycle. &#8220;There are moments in cybersecurity where it&#8217;s not a tool that appears (or emerges), but a change in scale that occurs. [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/rafael-nunez-from-computer-weekly-mythos-the-new-cyber-intelligence-that-accelerates-the-security-cycle/">Rafael Núñez from Computer Weekly: Mythos, the new cyber intelligence that accelerates the security cycle</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1920" height="1080" src="https://bitfinance.news/wp-content/uploads/2026/04/steve-a-johnson-_0iV9LmPDn0-unsplash.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Lo que describen es técnicamente disruptivo" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/04/steve-a-johnson-_0iV9LmPDn0-unsplash.jpg 1920w, https://bitfinance.news/wp-content/uploads/2026/04/steve-a-johnson-_0iV9LmPDn0-unsplash-300x169.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/04/steve-a-johnson-_0iV9LmPDn0-unsplash-1024x576.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/04/steve-a-johnson-_0iV9LmPDn0-unsplash-768x432.jpg 768w, https://bitfinance.news/wp-content/uploads/2026/04/steve-a-johnson-_0iV9LmPDn0-unsplash-1536x864.jpg 1536w" sizes="(max-width: 1920px) 100vw, 1920px" /></div><p style="text-align: justify;">In the prestigious specialized publication <a href="https://www.computerweekly.com/es/opinion/Mythos-la-nueva-ciberinteligencia-que-acelera-el-ciclo-de-la-seguridad" target="_blank" rel="noopener"><em>Computer Weekly</em></a>, Venezuelan expert <strong>Rafael Núñez Aponte</strong>, director of <em><a href="https://bitfinance.news/en/bancamiga-ambassador-jon-aramburu-on-winning-the-copa-del-rey-we-always-work-to-make-venezuela-proud/" target="_blank" rel="noopener">MásQue Seguridad</a></em>, shares his insightful and high-level opinions on <strong>Mythos</strong>, the new cyber intelligence that accelerates the <strong>IT security cycle.</strong></p>
<p style="text-align: justify;">&#8220;There are moments in cybersecurity where it&#8217;s not a tool that appears (or emerges), but a change in scale that occurs. <em>Claude Mythos Preview</em>, presented by <em>Anthropic,</em> seems to be one of those moments.&#8221;</p>
<p style="text-align: justify;">-It&#8217;s not a public product. It&#8217;s a contained experiment. According to its <a href="https://red.anthropic.com/2026/mythos-preview/" target="_blank" rel="noopener">official website</a>, it&#8217;s a model in the Preview phase, restricted to a closed group of organizations under the<strong> Glasswing</strong> program. There&#8217;s no open release date, and that alone speaks volumes.</p>
<p style="text-align: justify;"><strong>&#8220;What they describe is technically disruptive.</strong> During testing, the model was able to <a href="https://www.computerweekly.com/es/noticias/366628102/Empresas-enfrentan-problemas-de-seguridad-y-gobernanza-al-adoptar-la-IA" target="_blank" rel="noopener">identify previously unknown vulnerabilities</a> in widely used operating systems and browsers. We&#8217;re not talking about trivial flaws, and some had gone undetected for years.&#8221;</p>
<p style="text-align: justify;"><strong>-But the truly relevant aspect isn&#8217;t just finding vulnerabilities; it&#8217;s the ability to assist in building working exploits.</strong> In internal benchmarks, tasks that previously had marginal success rates began to be executed consistently. In some scenarios, <a href="https://www.computerweekly.com/es/noticias/366619340/El-enfoque-de-seguridad-en-2025-Plataformas-de-software-biometria-e-IA" target="_blank" rel="noopener">even users without advanced security training</a> achieved significant results by interacting with the model.</p>
<blockquote>
<p style="text-align: justify;"><strong>                                          What they describe is technically disruptive</strong></p>
</blockquote>
<p style="text-align: justify;">&#8220;For a penetration tester, or in the wrong hands, this means one thing: a radical reduction in attack time. Reconnaissance, correlation, and exploitation — phases that traditionally took days or weeks — can now be iterated in much shorter cycles. Not because the AI ​​attacks on its own, but because it reduces the distance between vulnerability and viable exploitation. That&#8217;s the real game-changer.&#8221;</p>
<p style="text-align: justify;">But this is where the public narrative falls short. <em>Mythos</em> isn&#8217;t just a threat. It&#8217;s potentially one of the <a href="https://www.computerweekly.com/es/cronica/Las-8-principales-predicciones-de-ciberseguridad-para-2026" target="_blank" rel="noopener">most advanced defensive tools</a> we&#8217;ve ever seen. T<strong>he same model that can identify exploit paths can also anticipate them, simulate them, and allow them to be corrected before they materialize</strong>. That&#8217;s precisely the logic behind <em>Glasswing</em>: hardening critical systems before other actors develop equivalent capabilities.</p>
<p style="text-align: justify;"><strong>&#8220;Cybersecurity has always been asymmetrical.</strong> The attacker needs to find a crack, while the defender must cover them all. With <em>Mythos</em>, that asymmetry begins to shrink because now both sides can operate with unprecedented speed.&#8221;</p>
<p style="text-align: justify;">&#8220;The name isn&#8217;t accidental. &#8216;Mythos,&#8217; in Greek, is the narrative that shapes reality. Not necessarily the truth, but the structure that makes it comprehensible.</p>
<p style="text-align: justify;"><strong>Today, in cybersecurity, we&#8217;re entering a stage where machines don&#8217;t understand like we do, but they generate models of the world coherent enough to act upon it.&#8221;</strong> And when that happens, <a href="https://www.computerweekly.com/es/cronica/En-2026-la-ciberseguridad-frente-a-la-IA-deja-atras-la-defensa-reactiva" target="_blank" rel="noopener">the risk is no longer in the tool itself</a>: it lies in who learns to use it first and in whose hands it ultimately ends up,”<strong> concludes this article by the specialist.</strong></p>
<p><img decoding="async" class="alignnone wp-image-120956 size-full" src="https://bitfinance.news/wp-content/uploads/2026/04/Rafael-Nunez-Aponte-1024x754-1.jpg" alt="" width="1024" height="754" srcset="https://bitfinance.news/wp-content/uploads/2026/04/Rafael-Nunez-Aponte-1024x754-1.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/04/Rafael-Nunez-Aponte-1024x754-1-300x221.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/04/Rafael-Nunez-Aponte-1024x754-1-768x566.jpg 768w, https://bitfinance.news/wp-content/uploads/2026/04/Rafael-Nunez-Aponte-1024x754-1-86x64.jpg 86w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p style="text-align: justify;"><strong>Brief author bio:</strong> <em>Rafael Núñez Aponte</em> is a Venezuelan entrepreneur specializing in cybersecurity, digital reputation, and cyber intelligence. Internationally recognized for his work in ethical hacking and content strategies, he is known for promoting the democratization of digital tools and cybersecurity.</p>
<p style="text-align: justify;"><em>Taken from <strong><a href="https://www.computerweekly.com/es/opinion/Mythos-la-nueva-ciberinteligencia-que-acelera-el-ciclo-de-la-seguridad" target="_blank" rel="noopener">Computer Weekly</a></strong> / Written by <a href="https://www.instagram.com/masqueseguridad/?hl=es" target="_blank" rel="noopener"><strong>Rafael Núñez Aponte</strong></a></em></p>
<p>Reference image source: Steve A Johnson on Unsplash</p>
<p><strong>Follow our news on Google!</strong> For current, interesting, and accurate information, <a href="https://www.google.com/search?q=site:bitfinance.news&amp;tbm=nws&amp;tbs=sbd:1" target="_blank" rel="noopener"><strong>click here</strong></a> to see all the content on <strong>Bitfinance.news</strong>. You can also find us on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/rafael-nunez-from-computer-weekly-mythos-the-new-cyber-intelligence-that-accelerates-the-security-cycle/">Rafael Núñez from Computer Weekly: Mythos, the new cyber intelligence that accelerates the security cycle</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New generation of ransomware targets Latin America with tailored attacks that cause severe damage</title>
		<link>https://bitfinance.news/en/new-generation-of-ransomware-targets-latin-america-with-tailored-attacks-that-cause-severe-damage/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 15:00:28 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Analysis and recommendations]]></category>
		<category><![CDATA[attacks in 17 countries]]></category>
		<category><![CDATA[customized and ultra-adaptive attacks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[double extortion]]></category>
		<category><![CDATA[economic and reputational damage]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[Martina López]]></category>
		<category><![CDATA[New generation of ransomware]]></category>
		<category><![CDATA[The Gentlemen ransomware]]></category>
		<category><![CDATA[Venezuela]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=120744</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="755" height="425" src="https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-principal.-que-es-el-ransomware-como-funciona.-Suministrada-por-ESET-y-Comstat-Rowland.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET advierte sobre un nuevo modelo de robo de información, silencioso y mucho más peligroso, que tiene a Latinoamérica dentro de sus objetivos. Se caracteriza por sus campañas dirigidas y adaptativas. Hacen gran daño económico y reputacional" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-principal.-que-es-el-ransomware-como-funciona.-Suministrada-por-ESET-y-Comstat-Rowland.jpeg 755w, https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-principal.-que-es-el-ransomware-como-funciona.-Suministrada-por-ESET-y-Comstat-Rowland-300x169.jpeg 300w" sizes="(max-width: 755px) 100vw, 755px" /></div><p>The Gentlemen ransomware attacked more than 250 victims in 17 countries, including Mexico, Colombia, Chile, and Argentina, and represents a new era of customized and ultra-adaptive attacks. Unlike other groups, this Ransomware as a Service (RaaS) studies the specific defenses of its victims and adapts its tools during the campaign to overcome existing controls. ESET, [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/new-generation-of-ransomware-targets-latin-america-with-tailored-attacks-that-cause-severe-damage/">New generation of ransomware targets Latin America with tailored attacks that cause severe damage</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="755" height="425" src="https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-principal.-que-es-el-ransomware-como-funciona.-Suministrada-por-ESET-y-Comstat-Rowland.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET advierte sobre un nuevo modelo de robo de información, silencioso y mucho más peligroso, que tiene a Latinoamérica dentro de sus objetivos. Se caracteriza por sus campañas dirigidas y adaptativas. Hacen gran daño económico y reputacional" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-principal.-que-es-el-ransomware-como-funciona.-Suministrada-por-ESET-y-Comstat-Rowland.jpeg 755w, https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-principal.-que-es-el-ransomware-como-funciona.-Suministrada-por-ESET-y-Comstat-Rowland-300x169.jpeg 300w" sizes="(max-width: 755px) 100vw, 755px" /></div><p style="text-align: justify;">The <strong>Gentlemen ransomware</strong> attacked <a href="https://www.ransomware.live/groupstats/thegentlemen" target="_blank" rel="noopener">more than 250 victims</a> in <strong>17 countries, including Mexico, Colombia, Chile, and Argentina,</strong> and represents a <strong>new era of customized and ultra-adaptive attacks.</strong> Unlike other groups, this <em>Ransomware as a Service (RaaS)</em> studies the specific defenses of its victims and adapts its tools during the campaign to overcome existing controls. <strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a></strong>, a leading company in proactive threat detection, analyzes the new landscape of ransomware groups and warns how this disciplined, meticulous, and highly methodical organization has disrupted traditional approaches to become <strong>one of the most active threats since July 2025.</strong></p>
<p style="text-align: justify;"><em>“It is an emerging <a href="https://www.welivesecurity.com/la-es/2022/02/23/ransomware-as-a-service-raas-que-es-como-funciona/" target="_blank" rel="noopener">Ransomware-as-a-Service group</a> that burst onto the cybercrime scene in mid-2025. Unlike other groups with more sloppy or rustic aesthetics, The Gentlemen stands out for its polished brand identity. It even maintains a leak site on the dark web with a professional logo and a slogan that reinforces its image as a disciplined and highly detail-oriented organization. This professionalism is not merely aesthetic; it is reflected in the precision of its attacks and the technical quality of its tools,”</em> says <strong>Martina Lopez, cybersecurity researcher at ESET Latin America.</strong></p>
<p style="text-align: justify;">Their operating model is based on <strong>double extortion,</strong> a tactic where they not only encrypt the victim&#8217;s files to block access, but also exfiltrate confidential data before encryption. Once they possess the information, they <strong>threaten to publish it on their leaks site if a ransom is not paid.</strong> This strategy puts massive<strong> pressure on companies, especially those that cannot afford a public data breach.</strong></p>
<p style="text-align: justify;">A ransomware attack by The Gentlemen <strong>typically begins by exploiting exposed internet access points</strong> (systems with open administration) <strong>or using previously stolen credentials.</strong> Once inside, they deploy tools to scan the internal network, understand how the company is organized, and identify users with elevated privileges, especially those with full access to the systems.</p>
<p style="text-align: justify;">To move within the network and escalate the attack, they use tools that allow them to remotely execute actions on multiple computers and modify key configurations. In this way, they manage to distribute the ransomware simultaneously across all connected devices, further weakening security mechanisms to facilitate remote access and control.</p>
<p style="text-align: justify;">In the final stage, <strong>they combine two critical actions: first, they steal sensitive information and send it to external servers in encrypted form; second, they lock down systems using encryption.</strong> Once the attack is complete, they <strong>execute processes designed to erase their tracks: they delete activity logs, remote connections, and any evidence that could allow them to reconstruct what happened,</strong> thus hindering subsequent investigations.</p>
<p style="text-align: justify;"><a href="https://www.ransomware.live/id/Sk4gQWNlcm9zQHRoZWdlbnRsZW1lbg==" target="_blank" rel="noopener">Their first documented victim</a> was registered on June 30, 2025, and since then, their activity has not ceased. They have affected <strong>critical sectors such as manufacturing, construction, healthcare, insurance, and financial services.</strong></p>
<figure id="attachment_120720" aria-describedby="caption-attachment-120720" style="width: 1300px" class="wp-caption alignnone"><img decoding="async" class="wp-image-120720 size-full" src="https://bitfinance.news/wp-content/uploads/2026/04/Para-acompanar-texto-imagen-referencial-1.png" alt="[Image: Detail of victims of The Gentlemen ransomware. Source: ransomware.live]" width="1300" height="687" srcset="https://bitfinance.news/wp-content/uploads/2026/04/Para-acompanar-texto-imagen-referencial-1.png 1300w, https://bitfinance.news/wp-content/uploads/2026/04/Para-acompanar-texto-imagen-referencial-1-300x159.png 300w, https://bitfinance.news/wp-content/uploads/2026/04/Para-acompanar-texto-imagen-referencial-1-1024x541.png 1024w, https://bitfinance.news/wp-content/uploads/2026/04/Para-acompanar-texto-imagen-referencial-1-768x406.png 768w" sizes="(max-width: 1300px) 100vw, 1300px" /><figcaption id="caption-attachment-120720" class="wp-caption-text">(Detail of victims of The Gentlemen ransomware. Source: ransomware.live)</figcaption></figure>
<p style="text-align: justify;"><strong>Geographically, their impact is global, but the most affected countries include the United States and Thailand, followed by India, Mexico, Colombia, Spain, and France.</strong> This distribution suggests that the group takes advantage of access opportunities wherever they arise, without an apparent geopolitical agenda.</p>
<p style="text-align: justify;">In mid-March 2026, they published on their website the attack on two organizations in Colombia in the healthcare and media sectors. During February, <a href="https://x.com/BirminghamCyber/status/2027038756096581697/photo/1" target="_blank" rel="noopener">they attacked a government scientific research institute in Argentina</a>, and in March,<a href="https://x.com/_venarix_/status/2033632495502004577" target="_blank" rel="noopener"> they claimed responsibility for an attack</a> on an organization in Chile. According to the <a href="https://www.ransomware.live/map?q=thegentlemen&amp;year=full" target="_blank" rel="noopener">ransomware.live website</a>, they also reported victims in<strong> Brazil, Peru, Ecuador, Venezuela, Guatemala, the Dominican Republic, Costa Rica, and Panama.</strong></p>
<figure id="attachment_120718" aria-describedby="caption-attachment-120718" style="width: 921px" class="wp-caption alignnone"><img decoding="async" class="wp-image-120718 size-full" src="https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-2-para-acompanar-cuerpo-del-texto.jpg" alt="The Gentlemen ransomware reports on its website the attack on a television channel" width="921" height="1203" srcset="https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-2-para-acompanar-cuerpo-del-texto.jpg 921w, https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-2-para-acompanar-cuerpo-del-texto-230x300.jpg 230w, https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-2-para-acompanar-cuerpo-del-texto-784x1024.jpg 784w, https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-2-para-acompanar-cuerpo-del-texto-768x1003.jpg 768w" sizes="(max-width: 921px) 100vw, 921px" /><figcaption id="caption-attachment-120718" class="wp-caption-text">The Gentlemen ransomware reports on its website the attack on a television channel</figcaption></figure>
<h3 style="text-align: left;">ESET provides the following list of recommendations to protect yourself from The Gentlemen ransomware:</h3>
<ul>
<li style="text-align: justify;"><strong>Reduce internet exposure:</strong> review which systems are accessible from outside and close any unnecessary access, especially administration panels or remote access.</li>
<li style="text-align: justify;"><strong>Protect credentials:</strong> use unique and strong passwords, enable<a href="https://www.welivesecurity.com/la-es/2022/12/22/doble-factor-autenticacion-que-es-porque-lo-necesito/" target="_blank" rel="noopener"> two-factor authentication</a>, and monitor any suspicious logins.</li>
<li style="text-align: justify;"><strong>Keep everything up to date:</strong> apply <a href="https://www.welivesecurity.com/la-es/2023/03/15/razones-mantener-software-dispositivos-actualizados/" target="_blank" rel="noopener">security patches</a> to operating systems, servers, and applications. Many of their intrusions exploit known vulnerabilities.</li>
<li style="text-align: justify;"><strong>Detect anomalous behavior:</strong> Implement solutions that allow you to identify unusual activity within the network, such as after-hours access or unexpected remote executions.</li>
<li style="text-align: justify;"><strong>Limit privileges:</strong> Not all users need full access. Reducing permissions minimizes the impact if an account is compromised.</li>
<li style="text-align: justify;"><strong>Segment the network:</strong> Separating critical systems prevents an attacker from moving freely and compromising the entire infrastructure.</li>
<li style="text-align: justify;"><strong>Perform backups:</strong> Carry out regular backups and store them in isolation, verifying that they can be restored correctly.</li>
<li style="text-align: justify;"><strong>Train the team:</strong> Human error remains one of the main entry points. Awareness is key.</li>
</ul>
<p style="text-align: justify;"><em>“In a scenario where attacks are no longer massive but personalized, the question is no longer whether an organization can be targeted, but when. Understanding how groups like The Gentlemen operate is the first step to anticipating a threat that no longer gives warning,”</em> concludes Lopez from ESET.</p>
<p style="text-align: left;">ESET invites you to learn more about cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/.</a></p>
<p style="text-align: left;">For useful preventative information, visit <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a> and follow them on social media @eset_ve, Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>), and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>.</p>
<p style="text-align: left;">Information and images provided by ESET and Comstat Rowland</p>
<p style="text-align: left;"><em><strong>Follow our news on Google!</strong></em><em> For current, interesting, and accurate information, </em><a href="https://www.google.com/search?q=site:bitfinance.news&amp;tbm=nws&amp;tbs=sbd:1" target="_blank" rel="noopener"><strong><em>click here</em></strong></a><em> to see all the content on <strong>Bitfinance.news</strong>. You can also find us on </em><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong><em>X/Twitter</em></strong></a><em> and </em><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong><em>Instagram</em></strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/new-generation-of-ransomware-targets-latin-america-with-tailored-attacks-that-cause-severe-damage/">New generation of ransomware targets Latin America with tailored attacks that cause severe damage</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ESET strengthens cloud security with new AI-powered capabilities</title>
		<link>https://bitfinance.news/en/eset-strengthens-cloud-security-with-new-ai-powered-capabilities/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 18:05:49 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[Michal Jankech]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Safeguarding]]></category>
		<category><![CDATA[Useful Innovations]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=120639</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1000" height="666" src="https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-Principal-ESET-Seguridad-informatica-1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="La compañía presenta Cloud Workload Protection, una nueva solución para proteger entornos en la nube, junto con mejoras en su plataforma ESET PROTECT para fortalecer la detección y respuesta ante amenazas" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-Principal-ESET-Seguridad-informatica-1.jpg 1000w, https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-Principal-ESET-Seguridad-informatica-1-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-Principal-ESET-Seguridad-informatica-1-768x511.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div><p>ESET, a leading company in proactive threat detection, announces the launch of Cloud Workload Protection, a new security module designed to protect virtual machines in public cloud environments and extend threat visibility beyond traditional endpoints and servers. Presented at RSA Conference 2026, this new module allows organizations to integrate cloud workload protection within ESET&#8217;s detection [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/eset-strengthens-cloud-security-with-new-ai-powered-capabilities/">ESET strengthens cloud security with new AI-powered capabilities</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1000" height="666" src="https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-Principal-ESET-Seguridad-informatica-1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="La compañía presenta Cloud Workload Protection, una nueva solución para proteger entornos en la nube, junto con mejoras en su plataforma ESET PROTECT para fortalecer la detección y respuesta ante amenazas" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-Principal-ESET-Seguridad-informatica-1.jpg 1000w, https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-Principal-ESET-Seguridad-informatica-1-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/04/Imagen-referencial-Principal-ESET-Seguridad-informatica-1-768x511.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div><p style="text-align: justify;"><a href="https://www.eset.com/latam/" target="_blank" rel="noopener"><strong>ESET</strong></a>, a leading company in proactive threat detection, announces the launch of <a href="https://www.eset.com/latam/empresas/soluciones/proteccion-de-cargas-de-trabajo-en-la-nube/" target="_blank" rel="noopener"><strong>Cloud Workload Protection</strong></a>, a new security module designed to protect virtual machines in public cloud environments and extend threat visibility beyond traditional endpoints and servers.</p>
<p style="text-align: justify;">Presented at <a href="https://www.rsaconference.com/usa" target="_blank" rel="noopener"><strong>RSA Conference 2026</strong></a>, this new module allows organizations to integrate cloud workload protection within ESET&#8217;s detection and response platform, consolidating the security management of endpoints, servers, and cloud environments into a single console.</p>
<p style="text-align: justify;"><em>“Many companies, especially in the midmarket and managed service providers, are increasingly adopting cloud services like virtual machines to improve their productivity,”</em> says <strong>Michal Jankech, Vice President of Enterprise &amp; SMB/MSP at ESET</strong>. <em>“With ESET Cloud Workload Protection, we extend our protection to public cloud environments like AWS, Azure, and Google Cloud, reducing the attack surface and providing greater visibility into potential threats.”</em></p>
<p style="text-align: justify;">The <a href="https://www.eset.com/latam/empresas/soluciones/proteccion-de-cargas-de-trabajo-en-la-nube/" target="_blank" rel="noopener"><strong>ESET Cloud Workload Protection</strong></a> module protects virtual machines in public cloud environments and integrates telemetry from these systems within the <strong>ESET PROTECT XDR</strong> platform, enabling security teams to gain broader visibility and respond more efficiently to incidents that may affect both on-premises and <em>cloud</em> infrastructures.</p>
<p style="text-align: justify;">Unlike many solutions on the market that offer cloud workload protection as a standalone product, ESET includes this capability at no additional cost for ESET PROTECT customers (except for the Entry edition).</p>
<p style="text-align: justify;">According to various industry estimates, the average cost of a data breach in public cloud environments can exceed $5 million per incident, reinforcing the need for tools that simplify protection and enable faster response to threats.</p>
<p style="text-align: justify;">Furthermore, the new module maintains ESET&#8217;s characteristic focus on providing lightweight and efficient solutions, allowing IT teams to validate security controls and generate evidence of compliance with regulatory standards such as NIST, CIS, HIPAA, and PCI DSS.</p>
<h3 style="text-align: left;">AI-Powered Enhancements</h3>
<p><img decoding="async" class="alignnone wp-image-120636 size-full" src="https://bitfinance.news/wp-content/uploads/2026/04/ESET-para-acompanar-cuerpo-de-texto-informativo-noticioso-1.jpg" alt="" width="1100" height="384" srcset="https://bitfinance.news/wp-content/uploads/2026/04/ESET-para-acompanar-cuerpo-de-texto-informativo-noticioso-1.jpg 1100w, https://bitfinance.news/wp-content/uploads/2026/04/ESET-para-acompanar-cuerpo-de-texto-informativo-noticioso-1-300x105.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/04/ESET-para-acompanar-cuerpo-de-texto-informativo-noticioso-1-1024x357.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/04/ESET-para-acompanar-cuerpo-de-texto-informativo-noticioso-1-768x268.jpg 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></p>
<p style="text-align: justify;">Along with the new module, ESET is announcing several enhancements to the <strong>ESET PROTECT</strong> platform, focused on simplifying incident investigation and improving response capabilities to attacks.</p>
<p><strong>Key new features include:</strong></p>
<p style="text-align: justify;"><strong>Advanced AI-powered reporting in ESET LiveGuard Advanced.</strong> ESET&#8217;s cloud sandboxing technology now includes more detailed behavioral reports on analyzed files. For organizations using subscriptions with XDR capabilities, these reports incorporate<strong> AI-generated summaries</strong> that help quickly interpret complex findings.</p>
<p style="text-align: justify;"><strong>Enhancements to incident investigation for EDR and XDR customers.</strong> The platform now offers more comprehensive incident graphs, clearly visualizing how an attack unfolded, identifying the initial entry point, and tracking its evolution over time. New contextual data, such as identity-related information, is also incorporated to accelerate analysis and response processes.</p>
<p style="text-align: justify;"><strong>Integration of ESET AI Advisor into the ESET PROTECT console.</strong> ESET&#8217;s AI-powered assistant is now directly integrated into the management console, providing security teams with easy access to its analysis and recommendation capabilities.</p>
<p style="text-align: justify;">With these new capabilities, <strong>ESET continues to expand its security platform to help organizations manage increasingly hybrid and complex environments, combining proactive protection, advanced detection, and investigation tools to </strong>enable faster and more efficient responses to modern threats.</p>
<p style="text-align: justify;">In parallel, the company also announced <strong><em>eCrime Reports</em></strong>, a new service within the<strong> ESET Threat Intelligence</strong> portfolio that offers detailed analysis of real-world incidents related to ransomware and infostealers. These reports include indicators of compromise (IoCs), technical campaign analysis, attack patterns, and recommendations to help security teams anticipate threats and strengthen their defense strategies.</p>
<p style="text-align: left;">To learn more about<strong> ESET solutions</strong>, visit: <a href="https://www.eset.com/latam/empresas/protect-platform/" target="_blank" rel="noopener">https://www.eset.com/latam/empresas/protect-platform/</a>.</p>
<p style="text-align: left;">ESET invites you to learn more and delve deeper into cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: left;">For useful preventative data, also available in Venezuela: <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and on their social media channels @eset_ve. Also on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p style="text-align: left;"><em>Information and reference images provided by ESET and Comstat Rowland</em></p>
<p style="text-align: left;"><strong>Follow our news on Google!</strong> For current, interesting, and accurate information, <a href="https://www.google.com/search?q=site:bitfinance.news&amp;tbm=nws&amp;tbs=sbd:1" target="_blank" rel="noopener"><strong>click here</strong></a> to see all the content on <strong>Bitfinance.news</strong>. You can also find us on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/eset-strengthens-cloud-security-with-new-ai-powered-capabilities/">ESET strengthens cloud security with new AI-powered capabilities</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What happen if our conversations with AI chatbots are exposed or revealed?</title>
		<link>https://bitfinance.news/en/what-happen-if-our-conversations-with-ai-chatbots-are-exposed-or-revealed/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 09 Mar 2026 12:00:50 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[5 main risks]]></category>
		<category><![CDATA[AI chatbots]]></category>
		<category><![CDATA[best practices]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[leaks]]></category>
		<category><![CDATA[Martina López]]></category>
		<category><![CDATA[our conversations can be exposed]]></category>
		<category><![CDATA[proactive threat detection]]></category>
		<category><![CDATA[Researcher]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[security and privacy measures]]></category>
		<category><![CDATA[they are not a confidential space]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=119945</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1244" height="700" src="https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Desde robos de identidad hasta extorsión y espionaje. ESET analiza qué datos se comparten con los chatbots, cómo pueden filtrarse y de qué manera reducir dicho riesgo" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R.jpg 1244w, https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R-300x169.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R-1024x576.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R-768x432.jpg 768w" sizes="(max-width: 1244px) 100vw, 1244px" /></div><p>Interaction with chatbots (ChatGPT, Gemini, Copilot, Claude, Perplexity, among others) has come to be treated as an intimate and secure space. Emotional, psychological, work-related, and medical concerns are entrusted to them. ESET, a leading company in proactive threat detection, analyzes what type of information is typically shared with AI chatbots, how it could be exposed, [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/what-happen-if-our-conversations-with-ai-chatbots-are-exposed-or-revealed/">What happen if our conversations with AI chatbots are exposed or revealed?</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1244" height="700" src="https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Desde robos de identidad hasta extorsión y espionaje. ESET analiza qué datos se comparten con los chatbots, cómo pueden filtrarse y de qué manera reducir dicho riesgo" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R.jpg 1244w, https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R-300x169.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R-1024x576.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R-768x432.jpg 768w" sizes="(max-width: 1244px) 100vw, 1244px" /></div><p style="text-align: justify;">Interaction with <strong>chatbots</strong> (ChatGPT, Gemini, Copilot, Claude, Perplexity, among others) has come to be treated as an intimate and secure space. Emotional, psychological, work-related, and medical concerns are entrusted to them. <strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a>,</strong> a leading company in<strong> proactive threat detection</strong>, analyzes what type of information is typically shared with AI chatbots, how it could be exposed, and what the <strong>real impact of a leak could be.</strong> Furthermore, they share digital <strong>best practices for continuing to use these tools without putting oneself at risk.</strong></p>
<p style="text-align: justify;"><em>“It’s not new that many people use chatbots as if they were private spaces. Using them in this way contradicts the nature of these tools, since the platforms themselves emphasize that conversations can be <a href="https://www.welivesecurity.com/es/privacidad/chatgpt-datos-recopila-almacena-peligros/" target="_blank" rel="noopener">stored, analyzed, or reviewed</a> to improve the service. Chatbots were not designed as a confidential space, even though the conversational experience might lead one to think otherwise. While the main AI platforms claim to implement <a href="https://openai.com/es-419/policies/privacy-policy/" target="_blank" rel="noopener">security and privacy measures</a> (access controls, monitoring, infrastructure protection), this does not eliminate the risk of data breaches, nor is it synonymous with invulnerability,”</em> highlights <strong>Martina Lopez, Cybersecurity Researcher at ESET Latin America.</strong></p>
<p style="text-align: justify;">When using them as personal assistants or even advisors, personal and sensitive information is often shared almost without realizing it. This includes:</p>
<ul style="text-align: justify;">
<li><strong>Personal data.</strong> Sensitive information such as name, age, city, and country, but also daily habits: where you work, who you live with, and your family composition. This information, combined and in the wrong hands, can be dangerous.</li>
<li><strong>Work-related information.</strong> Driven by the need to &#8220;Help me improve this,&#8221; many users share internal emails, contracts, reports, presentations, business strategies, campaigns, customer and supplier details, conversations, and support tickets. They also share source code and internal architectures.</li>
<li><strong>Medical, psychological, or emotional consultations.</strong> Chatbots are also perceived by many people as advisors or specialists (<a href="https://open.spotify.com/episode/08tEGYpLstxJGBUXMEEUiO" target="_blank" rel="noopener">a practice that can be dangerous</a>). Health-related issues are shared, such as symptoms, diagnoses, and medications, as well as personal matters like relationship conflicts, grief, questions they wouldn&#8217;t ask on other social media platforms, or requests for advice.</li>
<li><strong>Opinions, beliefs, and sensitive stances</strong>. Chatbots receive opinions from users with political or religious ideologies, views on companies, bosses, or colleagues, and also information that, taken out of context, can cause reputational damage.</li>
</ul>
<p style="text-align: justify;"><em>“The problem isn’t what’s shared, but rather that false sense of intimacy and privacy, which can be shattered very easily. Months of conversations build a profile that can be extremely valuable to a cyberattacker,”</em> adds Lopez from ESET.</p>
<p style="text-align: justify;">The information shared with AI chatbots can be exposed and fall into the hands of cybercriminals for various reasons. The main one is if <strong>someone gains access to the account.</strong> This can happen by accessing the password, falling victim to a <a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/que-es-phishing-guia-completa-2025/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=not-set&amp;utm_term=es" target="_blank" rel="noopener">phishing attack</a>, or using the same password for multiple services. Another reason is <a href="https://www.kcl.ac.uk/news/ai-chatbots-can-be-exploited-to-extract-more-personal-information" target="_blank" rel="noopener">manipulated chatbots</a>, which can be tricked with <em>malicious prompts</em> by cybercriminals to obtain user information. Furthermore,<strong> accepting terms and conditions without reading them</strong> is another risk, since chatbots collect and store usage information, such as history and conversations, <a href="https://news.stanford.edu/stories/2025/10/ai-chatbot-privacy-concerns-risks-research" target="_blank" rel="noopener">to train their language model</a> by default. It&#8217;s also important to consider potential <strong>security breaches, platform errors</strong> that expose user conversations and history, or if <strong>an extension or app is monitoring too much.</strong> For example, if a plugin is installed to enhance the chatbot&#8217;s capabilities and that app malfunctions, is vulnerable, or is malicious, the conversation could slip out of the main provider&#8217;s control.</p>
<h3 style="text-align: left;">The 5 key risks associated with a chatbot leak, according to ESET</h3>
<ol>
<li style="text-align: justify;"><strong>Identity theft / Social engineering:</strong> Chatbot conversations provide human context. Cyberattackers can thus obtain information about habits, interests, routines, services used, problems that transcend these, and even the tone of voice used. This allows for much <a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/que-es-la-ingenieria-social/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=seguridad-digital&amp;utm_term=es" target="_blank" rel="noopener">more personalized attacks</a>, through emails or messages that appear to be written by someone familiar, scams that include real-life details, or identity theft that is much harder to detect.</li>
<li style="text-align: justify;"><strong>Corporate espionage:</strong> Since many users rely on chatbots for work support, attackers can obtain confidential information such as strategies, documents, internal decisions, customer information, and pricing and/or product details. Beyond the legal risks this situation may entail, it can also represent a competitive advantage for third parties or the breach of certain contractual obligations.</li>
<li style="text-align: justify;"><strong>Reputational damage</strong>: If private opinions, professional doubts, or intimate thoughts are exposed, the consequences can range from workplace conflicts to a loss of professional credibility.</li>
<li style="text-align: justify;"><strong>Exposure of sensitive data:</strong> These types of chatbots are also used as a space for intimate consultations and often contain personal information such as symptoms, diagnoses, treatments, religious or political beliefs, and personal or family conflicts. If this information were leaked, the impact on the victim could be devastating: stigmatization, discrimination, and even emotional distress.</li>
<li style="text-align: justify;"><strong>Extortion:</strong> When a cyberattacker has access to private information, they can exert pressure through credible threats and personalized blackmail. The goal? To obtain some kind of financial gain from the victim.</li>
<li style="text-align: justify;"></li>
</ol>
<h3>A good way to reduce the impact of exposed conversations is to adopt best practices when interacting with these chatbots. A highly useful preventative checklist</h3>
<ul>
<li style="text-align: justify;">Do not share personal data (ID number, date of birth, email, phone number) is ESET&#8217;s top recommendation.</li>
<li style="text-align: justify;">Anonymize real-life situations (change names, companies, locations).</li>
<li style="text-align: justify;">Do not attach sensitive documents, confidential information, or credentials.</li>
<li style="text-align: justify;">Review privacy settings (what is saved, what is used for training).</li>
<li style="text-align: justify;">Protect your account with a strong password and two-factor authentication.</li>
<li style="text-align: justify;">Use different accounts for work and personal use.</li>
<li style="text-align: justify;">Ask yourself: Would I say this out loud in a room with strangers?</li>
</ul>
<p style="text-align: justify;"><em>“The comfort of a fluid, natural, and unjudged conversation makes us lower our guard and share information we would never publish in any other digital space. A leak of conversations exposes not only information but also routines, vulnerabilities, decisions, and emotions. However, this scenario should be taken as an invitation to understand what these platforms are and what they are not. They are not confidential spaces, personal advisors, or vaults of sensitive information. They are powerful tools, but like all technology, they require discretion, boundaries, and responsible digital habits,”</em> concludes the ESET researcher.</p>
<p style="text-align: justify;">ESET invites you to learn more about cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: justify;">For other useful preventative information, also available in Venezuela:  <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and on their social media channels @eset_ve. Also on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p style="text-align: justify;">Information and image provided by ESET and Comstat Rowland</p>
<p><em><strong>Follow our news on Google!</strong></em><em> For current, interesting, and accurate information, </em><a href="https://www.google.com/search?q=site:bitfinance.news&amp;tbm=nws&amp;tbs=sbd:1" target="_blank" rel="noopener"><strong><em>click here</em></strong></a><em> to see all the content on <strong>Bitfinance.news</strong>. You can also find us on </em><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong><em>X/Twitter</em></strong></a><em> and </em><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong><em>Instagram</em></strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/what-happen-if-our-conversations-with-ai-chatbots-are-exposed-or-revealed/">What happen if our conversations with AI chatbots are exposed or revealed?</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ESET discovery: First Android threat using generative AI</title>
		<link>https://bitfinance.news/en/eset-discovery-first-android-threat-using-generative-ai/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Sun, 22 Feb 2026 12:00:31 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Android threat using generative AI]]></category>
		<category><![CDATA[Argentina]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[discovery]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET investigation]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET researcher]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[impersonating Morgan Chase bank]]></category>
		<category><![CDATA[Lukáš Štefanko]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[MorganArg]]></category>
		<category><![CDATA[PromptSpy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Štefanko]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=119561</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1243" height="682" src="https://bitfinance.news/wp-content/uploads/2026/02/Imagen-referencial-ESET-descubre-primera-amenaza-para-Android-que-utiliza-IA-generativa-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Se trata del primer malware para Android con aparente motivación económica que utiliza la IA generativa como parte de su flujo de ejecución" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/02/Imagen-referencial-ESET-descubre-primera-amenaza-para-Android-que-utiliza-IA-generativa-Suministrada-por-ESET-y-Comstat-R.jpg 1243w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-referencial-ESET-descubre-primera-amenaza-para-Android-que-utiliza-IA-generativa-Suministrada-por-ESET-y-Comstat-R-300x165.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-referencial-ESET-descubre-primera-amenaza-para-Android-que-utiliza-IA-generativa-Suministrada-por-ESET-y-Comstat-R-1024x562.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-referencial-ESET-descubre-primera-amenaza-para-Android-que-utiliza-IA-generativa-Suministrada-por-ESET-y-Comstat-R-768x421.jpg 768w" sizes="(max-width: 1243px) 100vw, 1243px" /></div><p>The research team at ESET, a leading company in proactive threat detection, has discovered the first known Android malware that abuses generative AI in its execution flow to achieve persistence. Since the attackers rely on an AI model (specifically, Google&#8217;s Gemini) to guide the malicious manipulation of the user interface, ESET has named this family [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/eset-discovery-first-android-threat-using-generative-ai/">ESET discovery: First Android threat using generative AI</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1243" height="682" src="https://bitfinance.news/wp-content/uploads/2026/02/Imagen-referencial-ESET-descubre-primera-amenaza-para-Android-que-utiliza-IA-generativa-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Se trata del primer malware para Android con aparente motivación económica que utiliza la IA generativa como parte de su flujo de ejecución" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/02/Imagen-referencial-ESET-descubre-primera-amenaza-para-Android-que-utiliza-IA-generativa-Suministrada-por-ESET-y-Comstat-R.jpg 1243w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-referencial-ESET-descubre-primera-amenaza-para-Android-que-utiliza-IA-generativa-Suministrada-por-ESET-y-Comstat-R-300x165.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-referencial-ESET-descubre-primera-amenaza-para-Android-que-utiliza-IA-generativa-Suministrada-por-ESET-y-Comstat-R-1024x562.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-referencial-ESET-descubre-primera-amenaza-para-Android-que-utiliza-IA-generativa-Suministrada-por-ESET-y-Comstat-R-768x421.jpg 768w" sizes="(max-width: 1243px) 100vw, 1243px" /></div><p style="text-align: justify;">The research team at <a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a>, a leading company in proactive threat detection, has discovered the <strong>first known Android malware that abuses generative AI in its execution flow to achieve persistence.</strong> Since the attackers rely on an AI model (specifically, Google&#8217;s Gemini) to guide the <strong>malicious manipulation of the user interface,</strong> ESET has named this family <strong>PromptSpy</strong>. The malware can capture data from the lock screen, stop uninstallation attempts, collect device information, take screenshots, record screen activity, and much more. This is the second AI-based malware discovered by <strong>ESET Research</strong>, following PromptLock in August 2025, the first known case of AI-driven <strong>ransomware.</strong></p>
<p style="text-align: justify;">This is information of general technological interest in the field of cybersecurity, and of course, an important finding for all Android users in particular.</p>
<h3 style="text-align: left;">Key points of the ESET research</h3>
<ul>
<li><strong>PromptSpy is the first known Android malware that uses generative AI in its execution.</strong></li>
<li><strong>PromptSpy uses Google&#8217;s Gemini algorithm to interpret the elements displayed on the compromised device&#8217;s screen and provide instructions on how to perform various actions to remain in the recent apps list.</strong></li>
<li><strong>The primary goal is to deploy a Virtual Network Computing (VNC) module on the victim&#8217;s device, allowing attackers to view the screen and perform actions remotely.</strong></li>
<li><strong>PromptSpy can capture lock screen data, prevent uninstallation, gather device information, take screenshots, record screen activity,</strong> and perform other malicious activities.</li>
</ul>
<p style="text-align: justify;">This time, while generative AI is used in a portion of the code responsible for achieving persistence, it has a significant impact on the malware&#8217;s adaptability. Specifically, Gemini is used to analyze the current screen and provide <em>PromptSpy</em> with instructions on how to ensure the malicious application remains in the recent apps list, preventing the system from easily removing it. <strong>The AI ​​model and prompt are predefined in the code and cannot be modified.</strong></p>
<p style="text-align: justify;"><em>“The use of generative AI allows malicious actors to adapt to virtually any device, design, or version of the Android operating system, which can greatly expand the number of potential victims,”</em> says <strong>Lukáš Štefanko, the ESET</strong> researcher who discovered PromptSpy. <em>“The main objective of this malware is to deploy an embedded VNC module, which gives operators remote access to the victim’s device,”</em> Štefanko adds.</p>
<h4 style="text-align: left;">PromptSpy is distributed through a specific website and has never been available on Google Play</h4>
<p style="text-align: justify;">The expert and researcher elaborates that, based on linguistic localization clues and distribution vectors observed during the analysis, this campaign <strong>appears to be financially motivated and primarily targeting users in Argentina.</strong></p>
<p style="text-align: justify;">PromptSpy is distributed through a specific website and has never been available on Google Play. However, as a partner of the <strong>App Defense Alliance,</strong> ESET shared the findings with <strong>Google. Android</strong> users are automatically protected against known versions of this malware by <strong>Google Play Protect</strong>, which is enabled by default on Android devices with Google Play Services.</p>
<p style="text-align: justify;">Given that the app&#8217;s name is <strong>MorganArg</strong> and its icon appears to be inspired by Morgan Chase, the malware is likely trying <strong>to impersonate Morgan Chase bank.</strong> MorganArg, almost certainly an abbreviation of &#8220;Morgan Argentina,&#8221; also appears as the name of the cached website, suggesting a regional focus.</p>
<p style="text-align: justify;">PromptSpy blocks uninstallation by overlaying invisible elements on the screen. The only way for the victim to remove it is to restart the device in safe mode, where third-party apps are disabled and can be uninstalled normally. To enter safe mode, users typically have to press and hold the power button, press and hold &#8220;Power off,&#8221; and confirm the &#8220;Reboot to safe mode&#8221; message (although the exact method may vary depending on the device and manufacturer).</p>
<p style="text-align: justify;">Once the phone restarts in safe mode, the user can go to Settings → Applications → MorganArg and uninstall it without interference.</p>
<p style="text-align: justify;"><em>“Although PromptSpy only uses Gemini in one of its functions, it still demonstrates how the implementation of these tools can make malware more dynamic, providing malicious actors with ways to automate actions that would normally be more difficult with traditional scripts,”</em> says Štefanko of ESET.</p>
<p style="text-align: justify;">ESET invites you to learn more about cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: justify;">For other useful preventative information, also available in Venezuela: <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and on their social media channels @eset_ve. Also on Instagram  (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p style="text-align: left;"><em>Information and image provided by ESET and Comstat Rowland</em></p>
<p style="text-align: left;"><strong>Follow our news on Google!</strong> <em>For current, interesting, and accurate information</em>, <a href="https://www.google.com/search?q=site:bitfinance.news&amp;tbm=nws&amp;tbs=sbd:1" target="_blank" rel="noopener"><strong>click here</strong></a> to see all the content on <strong>Bitfinance.news</strong>. You can also find us on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/eset-discovery-first-android-threat-using-generative-ai/">ESET discovery: First Android threat using generative AI</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Recommendations to reduce credential theft: This digital risk is very common in Latin America</title>
		<link>https://bitfinance.news/en/recommendations-to-reduce-credential-theft-this-digital-risk-is-very-common-in-latin-america/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Wed, 18 Feb 2026 11:00:13 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[best practices]]></category>
		<category><![CDATA[brazil]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[education]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[Martina López]]></category>
		<category><![CDATA[methodologies used by cybercriminals]]></category>
		<category><![CDATA[Perú]]></category>
		<category><![CDATA[preventative recommendations]]></category>
		<category><![CDATA[Researcher]]></category>
		<category><![CDATA[risk reduction]]></category>
		<category><![CDATA[security tips]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=119415</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="627" src="https://bitfinance.news/wp-content/uploads/2026/02/Imagen-refrencial-Ppal-Robo-de-credenciales-metodos-mas-frecuentes-y-recomendaciones-para-reducir-el-riesgo.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET advierte que Brasil, México y Perú están entre los países de Latinoamérica más afectados por los malwares especializados en hurto o rapto de información" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/02/Imagen-refrencial-Ppal-Robo-de-credenciales-metodos-mas-frecuentes-y-recomendaciones-para-reducir-el-riesgo.jpg 1200w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-refrencial-Ppal-Robo-de-credenciales-metodos-mas-frecuentes-y-recomendaciones-para-reducir-el-riesgo-300x157.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-refrencial-Ppal-Robo-de-credenciales-metodos-mas-frecuentes-y-recomendaciones-para-reducir-el-riesgo-1024x535.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-refrencial-Ppal-Robo-de-credenciales-metodos-mas-frecuentes-y-recomendaciones-para-reducir-el-riesgo-768x401.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></div><p>Credential theft is a threat that has been plaguing the world for over a decade. In Latin America, it is growing steadily in tandem with digitalization and the rise in online fraud. Last year alone, more than 2.6 million credentials were compromised in the region, according to a 2025 SOCRadar report. This material is of [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/recommendations-to-reduce-credential-theft-this-digital-risk-is-very-common-in-latin-america/">Recommendations to reduce credential theft: This digital risk is very common in Latin America</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="627" src="https://bitfinance.news/wp-content/uploads/2026/02/Imagen-refrencial-Ppal-Robo-de-credenciales-metodos-mas-frecuentes-y-recomendaciones-para-reducir-el-riesgo.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET advierte que Brasil, México y Perú están entre los países de Latinoamérica más afectados por los malwares especializados en hurto o rapto de información" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/02/Imagen-refrencial-Ppal-Robo-de-credenciales-metodos-mas-frecuentes-y-recomendaciones-para-reducir-el-riesgo.jpg 1200w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-refrencial-Ppal-Robo-de-credenciales-metodos-mas-frecuentes-y-recomendaciones-para-reducir-el-riesgo-300x157.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-refrencial-Ppal-Robo-de-credenciales-metodos-mas-frecuentes-y-recomendaciones-para-reducir-el-riesgo-1024x535.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-refrencial-Ppal-Robo-de-credenciales-metodos-mas-frecuentes-y-recomendaciones-para-reducir-el-riesgo-768x401.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></div><p style="text-align: justify;"><strong>Credential theft </strong>is a threat that has been plaguing the world for over a decade. <strong>In Latin America, it is growing steadily in tandem with digitalization and the rise in online fraud.</strong> <strong>Last year alone, more than 2.6 million credentials were compromised in the region</strong>, <a href="https://bitfinance.news/en/chevron-can-increase-oil-production-in-venezuela-to-300000-barrels-per-day/" target="_blank" rel="noopener">according to a 2025 SOCRadar report</a>.</p>
<p style="text-align: justify;">This material is of <strong>educational interest</strong> to both advanced and frequent users, as well as basic and occasional users, and we should pay attention to it. <strong>It may be useful to archive and preserve it</strong>. Keep in mind that <strong>all countries and internet users have some degree of vulnerability and are therefore at risk.</strong> No one is immune to this risk; we must act preventively to reduce or mitigate it.</p>
<p style="text-align: justify;"><strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a></strong>, a leading company in proactive threat detection, <strong>warns that access to an email account allows attackers to access banking services, corporate platforms, financial information, and even medical records.</strong></p>
<p style="text-align: justify;">The ways cybercriminals obtain user passwords vary in difficulty and technical expertise. ESET categorizes them into <strong>three methodologies: those that exploit social engineering techniques, those that use malware, and those that result from an attack on the organization that should be protecting them.</strong></p>
<h2 style="text-align: left;">What methodologies do hackers use?</h2>
<h3>1.Social Engineering Techniques:</h3>
<p style="text-align: justify;">This method falsely uses the names of public entities or well-known companies to lower suspicion and increase the effectiveness of attacks. The most common method is sending emails or messaging applications in which the attacker impersonates a legitimate entity to deceive the victim and persuade them to voluntarily hand over their login credentials.</p>
<p style="text-align: justify;">These messages share a common characteristic: they appeal to urgency and simulate a notification of a problem requiring immediate action: account issues, a rejected payment, problems with a reservation, among countless other excuses. They often contain a malicious link to sites that mimic legitimate ones to steal victims&#8217; sensitive data, such as passwords and usernames.</p>
<p style="text-align: justify;">Another form phishing takes is through fake websites that rank highly in search engine results like Google with sponsored ads, because the attacker pays for visibility to impersonate real pages. In these scenarios, even cautious people can be tricked into clicking on <a href="https://www.welivesecurity.com/es/concientizacion/desconfiar-resultados-google-phishing/" target="_blank" rel="noopener">a seemingly legitimate result</a> that replicates the visual identity of banks, email platforms, cloud services, or reputable companies.</p>
<h3>2.Distribution of specific malware:</h3>
<p style="text-align: justify;">Another common way to steal passwords is through the use of malware, which activates once the user&#8217;s device has been compromised. In these cases, ESET explains, there is no specific deception or alert message; instead, the theft occurs in the background, often without the victim noticing.</p>
<p style="text-align: justify;">Infostealers, keyloggers, and spyware all share the common characteristic of continuously collecting sensitive information, including passwords stored in browsers, autofill data, application credentials, and active sessions. The impact of these types of malware is not limited to a single account, as the malicious program continues to collect credentials as long as the user uses the infected device, ESET points out.</p>
<figure id="attachment_119410" aria-describedby="caption-attachment-119410" style="width: 1256px" class="wp-caption alignnone"><img decoding="async" class="wp-image-119410 size-full" src="https://bitfinance.news/wp-content/uploads/2026/02/Imagen-complementaria-2.jpg" alt="Distribución de detecciones de infostealers por país, en Latinoamérica. Fuente: Telemetría ESET" width="1256" height="844" srcset="https://bitfinance.news/wp-content/uploads/2026/02/Imagen-complementaria-2.jpg 1256w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-complementaria-2-300x202.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-complementaria-2-1024x688.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/02/Imagen-complementaria-2-768x516.jpg 768w" sizes="(max-width: 1256px) 100vw, 1256px" /><figcaption id="caption-attachment-119410" class="wp-caption-text"><a style="font-size: 16px;" href="https://www.welivesecurity.com/es/contrasenas/robo-de-credenciales-metodos-mas-frecuentes/#article-2" target="_blank" rel="noopener"><strong><em>Distribución de detecciones de infostealers por país, en Latinoamérica. Fuente: Telemetría ESET</em></strong></a></figcaption></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">Within this same ecosystem, banking Trojans emerge, specifically targeting login credentials for bank accounts and financial platforms. Through fake windows, they capture data the moment the user enters it. This type of threat, <a href="https://bitfinance.news/en/license-30b-authorizes-transactions-for-port-and-airport-operations-in-venezuela/" target="_blank" rel="noopener">not new to the region</a>, exceeded 650,000 unique detections in 2025, 110,000 of which belonged to a single family: <a href="https://www.welivesecurity.com/es/malware/infostealers-presentes-latinoamerica-2025/#:~:text=y%20la%20persistencia.-,guildma,-Guildma%20forma%20parte" target="_blank" rel="noopener">Guildma</a>.</p>
<h3 style="text-align: justify;">3.Attacks on organizations:</h3>
<p style="text-align: justify;">Another significant source of credential theft is incidents where an organization&#8217;s databases are exposed due to a weakness or failure in its systems. In the most critical scenarios, leaks include complete credentials, either in plain text or with weak security mechanisms, allowing attackers to reuse them immediately. However, even when passwords are not directly exposed, leaked emails or usernames remain valuable to malicious actors. This information is then used as the basis for credential stuffing or brute-force attacks, exploiting the reuse of passwords across different services.</p>
<p style="text-align: justify;">Once a database is compromised, the information can circulate for years in underground forums and be reused in different contexts and against multiple platforms. In this way, a single breach in one organization ends up amplifying the risk for other companies and for users themselves, even long after the original incident has been fixed.</p>
<p style="text-align: justify;"><em>“There are also brute-force threats. These consist of automatically trying multiple username and password combinations until successful access is achieved, without needing to deceive the user or compromise their device beforehand. They typically rely on lists of common passwords or credentials leaked in previous incidents, taking advantage of password reuse and the lack of additional authentication controls. When exposed services lack mechanisms to limit login attempts or adequate monitoring, this type of attack remains effective, especially against remote access, web applications, and corporate services published on the internet,” </em>comments <strong>Martina López, Cybersecurity Researcher at ESET Latin America.</strong></p>
<h2>It is advisable to combine and add best practices with preventative measures</h2>
<p style="text-align: justify;">Credential theft by <strong>cybercriminals</strong> can occur <strong>through various vectors.</strong> The ESET research team maintains that <strong>prevention does not depend on taking a single measure, but rather on a combination of practices:</strong></p>
<ul style="text-align: justify;">
<li>Use unique and strong passwords for each service, since credential stuffing is common among cyberattackers using credentials that are sold commercially.</li>
<li>Enable multifactor authentication whenever possible, as this mechanism complements and strengthens the passwords you use.</li>
<li>Be wary of unexpected messages and avoid downloading files or clicking on suspicious links, as malware and phishing remain the most common ways credentials are stolen.</li>
<li>Store passwords in password managers and avoid saving them in plain text or on shared devices.</li>
<li>Keep systems and applications updated to patch any vulnerabilities.</li>
<li>Review unusual access and activity on your accounts, either by keeping login alerts enabled or by checking the privacy or access settings of your applications.</li>
</ul>
<p style="text-align: justify;"><strong>In the event that a password has already been stolen, ESET emphasizes that reaction time makes the difference between an isolated incident and a major problem. Therefore, they recommend:</strong></p>
<ul style="text-align: justify;">
<li>Change the affected passwords and any others where the same credentials were used.</li>
<li>Close active sessions on the affected account and revoke recent access in services and applications where possible.</li>
<li>Check for unauthorized changes to accounts and monitor for future changes to messages, settings, payments, and other data.</li>
<li>Use a security tool on potentially affected devices to remove any malicious code.</li>
</ul>
<p style="text-align: justify;"><em>&#8220;While password theft is not a new problem, it continues to grow and adapt to new technologies, along with our increasingly complex digital lives. In this context<strong>, digital literacy and best practices become essential to protect our identity, information, and devices at both the individual and corporate levels.</strong> Staying informed is vital to staying ahead of the latest cybersecurity trends,&#8221;</em> concludes López from ESET.</p>
<p style="text-align: justify;">ESET invites you to learn more about cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: justify;">For other useful preventative information, also available in Venezuela at:  <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and on their social media channels @eset_ve. Also on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p><em>Information and images provided by ESET and Comstat Rowland</em></p>
<p><strong>Follow our news on Google!</strong> For current, interesting, and accurate information, <a href="https://www.google.com/search?q=site:bitfinance.news&amp;tbm=nws&amp;tbs=sbd:1" target="_blank" rel="noopener"><strong>click here</strong></a> to see all the content on <strong>Bitfinance.news</strong>. You can also find us on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/recommendations-to-reduce-credential-theft-this-digital-risk-is-very-common-in-latin-america/">Recommendations to reduce credential theft: This digital risk is very common in Latin America</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Malicious actors hunt and manipulate on the important LinkedIn network; we must protect ourselves</title>
		<link>https://bitfinance.news/en/malicious-actors-hunt-and-manipulate-on-the-important-linkedin-network-we-must-protect-ourselves/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Fri, 30 Jan 2026 19:30:21 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Analysis and opinion]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latam]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[How to protect yourself]]></category>
		<category><![CDATA[Hunt and manipulate on LinkedIn]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[malicious actors]]></category>
		<category><![CDATA[Malicious campaigns]]></category>
		<category><![CDATA[Mario Micucci]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Researcher]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=118992</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1000" height="667" src="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-Por-que-LinkedIn-es-un-terreno-de-caza-para-los-actores-maliciosos-y-como-protegerse-Suministrada-por-ESET-y-Comstat-Rowland.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET analiza como esta red social profesional es una vasta base de datos pública de información corporativa en la que no todas las personas son quienes dicen ser" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-Por-que-LinkedIn-es-un-terreno-de-caza-para-los-actores-maliciosos-y-como-protegerse-Suministrada-por-ESET-y-Comstat-Rowland.jpg 1000w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-Por-que-LinkedIn-es-un-terreno-de-caza-para-los-actores-maliciosos-y-como-protegerse-Suministrada-por-ESET-y-Comstat-Rowland-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-Por-que-LinkedIn-es-un-terreno-de-caza-para-los-actores-maliciosos-y-como-protegerse-Suministrada-por-ESET-y-Comstat-Rowland-768x512.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div><p>Last November, the UK&#8217;s Security Service alerted members of Parliament about a foreign intelligence-gathering scheme: two LinkedIn profiles were contacting people working in British politics to request &#8220;insider information.&#8221; The MI5 revelations triggered a £170 million ($230 million) government initiative to address espionage threats against Parliament. While this is a high-profile case, ESET, a leading [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/malicious-actors-hunt-and-manipulate-on-the-important-linkedin-network-we-must-protect-ourselves/">Malicious actors hunt and manipulate on the important LinkedIn network; we must protect ourselves</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1000" height="667" src="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-Por-que-LinkedIn-es-un-terreno-de-caza-para-los-actores-maliciosos-y-como-protegerse-Suministrada-por-ESET-y-Comstat-Rowland.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET analiza como esta red social profesional es una vasta base de datos pública de información corporativa en la que no todas las personas son quienes dicen ser" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-Por-que-LinkedIn-es-un-terreno-de-caza-para-los-actores-maliciosos-y-como-protegerse-Suministrada-por-ESET-y-Comstat-Rowland.jpg 1000w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-Por-que-LinkedIn-es-un-terreno-de-caza-para-los-actores-maliciosos-y-como-protegerse-Suministrada-por-ESET-y-Comstat-Rowland-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-Por-que-LinkedIn-es-un-terreno-de-caza-para-los-actores-maliciosos-y-como-protegerse-Suministrada-por-ESET-y-Comstat-Rowland-768x512.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div><p style="text-align: justify;">Last November, the <strong>UK&#8217;s Security Service</strong> alerted members of <strong>Parliament</strong> about a <strong>foreign intelligence-gathering scheme:</strong> two <strong>LinkedIn</strong> profiles were contacting people working in British politics <a href="https://www.bbc.co.uk/news/articles/c4gpnz05kr8o" target="_blank" rel="noopener">to request &#8220;insider information.&#8221;</a> The <strong>MI5</strong> revelations triggered a £170 million ($230 million) government initiative to address espionage threats against Parliament. While this is a high-profile case, <strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a></strong>, a leading company in proactive threat detection, states that it is far from the first or only one. The site could also be a veritable treasure trove of corporate data that could be maliciously used to support fraud or threat campaigns.</p>
<p style="text-align: justify;">Therefore, it is important to <strong>learn from this analysis and valuable professional opinion</strong> provided by ESET.</p>
<p style="text-align: justify;">LinkedIn has amassed over one billion members worldwide since its founding in 2003. This represents a vast pool of <strong>potential targets for state-backed or financially motivated threat actors.</strong> Firstly, it is an <strong>extraordinary source of information</strong> where malicious actors can discover the roles and <a href="https://www.welivesecurity.com/es/seguridad-corporativa/oversharing-que-esta-en-juego-si-empleados-comparten-demasiado/" target="_blank" rel="noopener">responsibilities of key individuals within a target company</a> and reconstruct or reshape the relationships between individuals and projects they might be working on. Furthermore, it <strong>provides credibility and cover</strong> because, as a professional network, it is frequented by both high-level executives and lower-level employees, and it is a context in which a victim is more likely to open a direct message or InMail from someone on the platform than an unsolicited email.</p>
<p style="text-align: justify;">On the other hand, it <strong>bypasses “traditional” security</strong> because there is no guarantee that phishing messages, malware, or spam won&#8217;t get through; and due to the site&#8217;s perceived credibility, target users may be more likely to click on malicious content. Finally, <strong>it&#8217;s easy to start operating;</strong> anyone can create a profile and begin lurking on the site to gather intelligence or send phishing messages and Business Enforcement (BEC) scams. Furthermore, attackers can hijack existing accounts <a href="https://bitfinance.news/en/the-fed-keeps-rates-current-without-short-term-cuts-expectations/" target="_blank" rel="noopener">or create fake identities before posing as candidates and recruiters</a> for positions and jobs. The large number of compromised credentials circulating on cybercrime forums (<a href="https://bitfinance.news/en/amazon-to-cut-more-jobs-to-focus-on-ai/" target="_blank" rel="noopener">due in part to infostealers</a>) makes this relatively easy.</p>
<h3 style="text-align: justify;">There are several ways threat actors can operationalize their malicious campaigns:</h3>
<ul>
<li style="text-align: justify;"><strong>Phishing and spearphishing:</strong> By using the information users share in their profiles, attackers can customize phishing campaigns (fake emails) to increase their success rate.</li>
<li style="text-align: justify;"><strong>Direct attacks:</strong> Contact can be made directly through malicious links designed to deploy malware, such as infostealers, or promote fake job offers intended to steal credentials.</li>
<li style="text-align: justify;"><strong>BEC:</strong> Similar to phishing, LinkedIn provides a wealth of intelligence that can be used to make Business Email Compromise attacks appear more convincing. It can help scammers identify who reports to whom, what projects they are working on, and the names of partners or suppliers.</li>
<li style="text-align: justify;"><strong>Deepfakes:</strong> LinkedIn can also host videos of targeted individuals, which can be used to create <a href="https://www.welivesecurity.com/es/seguridad-digital/herramientas-para-detectar-deepfakes-combatir-desinformacion/" target="_blank" rel="noopener">deepfakes</a> and employ them in subsequent phishing, BEC, or social media scams.</li>
<li style="text-align: justify;"><strong>Account hijacking:</strong> Fake LinkedIn pages (phishing), infostealers, credential stuffing, and other techniques can help attackers take control of user accounts. These hijacked accounts can then be used in subsequent attacks targeting their contacts.</li>
<li style="text-align: justify;"><strong>Attacks on suppliers:</strong> LinkedIn can also be tracked for information about partners of a target company, who would also be targeted with phishing as part of a malicious “domino effect” strategy.</li>
</ul>
<p style="text-align: justify;"><em>“The challenge posed by threats on LinkedIn is that IT departments find it difficult to obtain accurate information about the extent of the risk their employees face, and the tactics used to attack them. However, <strong>it makes sense to include LinkedIn threat scenarios like those described above in security awareness training courses.</strong> Employees should also be warned about the risk of oversharing information on the platform and given guidance on how to detect fake accounts and typical phishing lures,”</em> says <strong>Mario Micucci, Cybersecurity Researcher at ESET Latin America.</strong></p>
<h3 style="text-align: left;">ESET provides information on various threat groups that have used some of these tactics</h3>
<ul>
<li style="text-align: justify;"><strong>The Lazarus Group (North Korea)</strong> has posed as recruiters on LinkedIn to install malware on the computers of people working at an aerospace company, according to ESET Research. In fact, the research team also recently described the “Wagemole” campaigns, in which individuals aligned with North Korea attempt to obtain employment at foreign companies.</li>
<li style="text-align: justify;"><strong>ScatteredSpider</strong> contacted MGM&#8217;s help desk, impersonating an employee whose identity they obtained from LinkedIn, in order to gain access to the organization. The subsequent ransomware attack resulted in losses of $100 million.</li>
<li style="text-align: justify;">A <a href="https://www.darkreading.com/application-security/ducktail-spearphishing-linkedin-hijack-facebook-business-accounts" target="_blank" rel="noopener">spearphishing campaign called “Ducktail”</a> targeted marketing and human resources professionals on LinkedIn, delivering malware and stealing information through links sent via direct message. The malware was hosted in the cloud.</li>
</ul>
<h2>Prevention</h2>
<p style="text-align: justify;"><em>“<strong>To prevent account hijacking, a policy of regularly updating patches should be followed, security software should be installed on all devices (from a trusted vendor), and multifactor authentication should be enabled.</strong> Additionally,<strong> in corporate environments, it may be worthwhile to organize specific training sessions for executives,</strong> who are often the most frequent targets of attacks. Above all, ensure that <strong>the team is aware that, even on a network considered trustworthy like LinkedIn, not everyone acts in good faith or in their best interest,”</strong></em> recommends the ESET researcher.</p>
<p style="text-align: justify;">ESET invites you to learn more about cybersecurity by visiting:  <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: justify;">For other useful preventative information, also available in Venezuela at: <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and on their social media channels @eset_ve. Also on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>)  and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p>Information and image provided by ESET</p>
<p><em><strong>Follow our news on Google!</strong></em><em> For current, interesting, and accurate information, </em><a href="https://www.google.com/search?q=site:bitfinance.news&amp;tbm=nws&amp;tbs=sbd:1" target="_blank" rel="noopener"><strong><em>click here</em></strong></a><em> to see all the content on <strong>Bitfinance.news</strong>. You can also find us on </em><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong><em>X/Twitter</em></strong></a><em> and </em><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong><em>Instagram</em></strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/malicious-actors-hunt-and-manipulate-on-the-important-linkedin-network-we-must-protect-ourselves/">Malicious actors hunt and manipulate on the important LinkedIn network; we must protect ourselves</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Let&#8217;s reduce risks: How cybercriminals use stolen information</title>
		<link>https://bitfinance.news/en/lets-reduce-risks-how-cybercriminals-use-stolen-information/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 26 Jan 2026 12:30:08 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[corporate and institutional data]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[personal and sensitive or private data]]></category>
		<category><![CDATA[protect yourself]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[reduce risk]]></category>
		<category><![CDATA[Safeguard]]></category>
		<category><![CDATA[suggestions]]></category>
		<category><![CDATA[theft]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=118842</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="985" height="553" src="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET analiza e informa sobre la utilización maliciosa de los datos sensibles y/o confidenciales robados, uno de los botines predilectos del cibercrimen, algo que debemos prevenir y frente a lo cual resguardarnos" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R.jpg 985w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R-300x168.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R-768x431.jpg 768w" sizes="(max-width: 985px) 100vw, 985px" /></div><p>For cybercriminals, information represents money, an access point, and also a tool for committing new crimes. This is why personal and sensitive or private data, such as full names, contact information, credit card numbers and banking credentials, health data, social media and service login credentials, among others, have become one of the most coveted targets [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/lets-reduce-risks-how-cybercriminals-use-stolen-information/">Let&#8217;s reduce risks: How cybercriminals use stolen information</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="985" height="553" src="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET analiza e informa sobre la utilización maliciosa de los datos sensibles y/o confidenciales robados, uno de los botines predilectos del cibercrimen, algo que debemos prevenir y frente a lo cual resguardarnos" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R.jpg 985w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R-300x168.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R-768x431.jpg 768w" sizes="(max-width: 985px) 100vw, 985px" /></div><p style="text-align: justify;">For <strong>cybercriminals,</strong> information represents money, an access point, and also a tool for committing new crimes. This is why <strong>personal and sensitive or private data,</strong> such as full names, contact information, credit card numbers and banking credentials, health data, social media and service login credentials, among others, have become one of the most coveted targets for malicious actors. <strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a></strong>, a leading international company in proactive threat detection, analyzes <strong>what cybercriminals do once they obtain stolen information.</strong></p>
<h2 style="text-align: left;">Most common actions</h2>
<p style="text-align: justify;"><strong>Selling it on underground forums:</strong> One of the main benefits cybercriminals derive from stolen information is simply money. Personal data has significant value for the criminal ecosystem. They primarily sell it on<strong> underground forums and Dark Web marketplaces,</strong> where personal data, login credentials, banking and financial information, corporate passwords, and any other sensitive information are sought after by other cybercriminals for use in various illegal activities.</p>
<h3 style="text-align: left;">Other crimes</h3>
<ul style="text-align: justify;">
<li><strong><a href="https://www.welivesecurity.com/la-es/2022/05/11/que-es-robo-suplantacion-de-identidad/" target="_blank" rel="noopener">Identity theft</a>:</strong> The more information cybercriminals obtain about a person, the more tools they have to create a fake digital profile and thus scam their contacts or commit cybercrimes in their name. • Financial fraud: Certain personal data facilitates access to financial resources, allowing cybercriminals to obtain illicit gains. This can range from making purchases to applying for credit cards.</li>
<li><strong>Personalized <a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/que-es-phishing-guia-completa-2025/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=cibercrimen&amp;utm_term=es" target="_blank" rel="noopener">phishing</a> attacks:</strong> Stolen information allows cybercriminals to create much more credible and targeted phishing emails. Data such as the victim&#8217;s work email address or the company where they work can lend a false sense of authenticity to an email with malicious intent.</li>
<li><strong>Extortion of victims:</strong> Information is a very powerful tool that, in the wrong hands, can be used for extortion and blackmail. Cybercriminals often use it to pressure their victims, from a concrete threat to making confidential data public, selling it to competitors, or simply causing reputational damage. In most of these cases, their goal is to obtain money.</li>
<li><strong>Espionage and sabotage:</strong> In the business or government sector, a simple stolen password can be the gateway to internal networks, critical infrastructure, and even confidential information belonging to clients, suppliers, allies, or business partners—and that&#8217;s just the beginning.</li>
</ul>
<p style="text-align: justify;">In contrast to the points mentioned above, in these cases the objective is not monetary, but rather <strong><a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/octubre-rojo-malware-robo-documentos-secretos/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=cibercrimen&amp;utm_term=es" target="_blank" rel="noopener">to spy undetected</a>, accessing networks, emails, and internal communications, <a href="https://www.welivesecurity.com/la-es/2017/06/20/sistemas-industriales-en-la-mira/" target="_blank" rel="noopener">altering production or logistics processes</a>, and even deleting, modifying, or corrupting key information.</strong></p>
<p style="text-align: justify;">In this context, <strong>it becomes essential to take concrete actions to protect sensitive and confidential data, whether personal, corporate, or institutional.</strong></p>
<h4 style="text-align: left;">ESET Latin America shares recommendations to significantly reduce the risk of data being exposed or falling into the wrong hands</h4>
<ul>
<li>Protect your information: avoid sharing <a href="https://www.welivesecurity.com/la-es/2022/12/29/datos-personales-internet-como-limpiar-presencia-online/" target="_blank" rel="noopener">personal data online</a>.</li>
<li>Use <a href="https://www.welivesecurity.com/es/contrasenas/contrasenas-que-tan-seguras-son/" target="_blank" rel="noopener">strong passwords</a>: they should be robust and unique for each account.</li>
<li>Activate <a href="https://www.welivesecurity.com/la-es/2022/12/22/doble-factor-autenticacion-que-es-porque-lo-necesito/" target="_blank" rel="noopener">two-factor authentication</a> on every account that allows it.</li>
<li>Keep both <a href="https://www.welivesecurity.com/la-es/2023/03/15/razones-mantener-software-dispositivos-actualizados/" target="_blank" rel="noopener">devices and software up to date</a>.</li>
<li>Have a robust and reliable <a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/como-elegir-antivirus-5-puntos-clave/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=cibercrimen&amp;utm_term=es" target="_blank" rel="noopener">security solution</a>.</li>
<li>Stay up-to-date on the <a href="https://www.welivesecurity.com/es/contrasenas/contrasenas-que-tan-seguras-son/" target="_blank" rel="noopener">latest cybersecurity news</a>.</li>
</ul>
<p style="text-align: justify;">For other useful data and preventative information, visit <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>and follow them on social media @eset_ve. Also on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.instagram.com/esetla/&amp;source=gmail&amp;ust=1769512253651000&amp;usg=AOvVaw3XM_vgVucFHwwlgxBtIibu">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p><em>Information and image provided by ESET and Comstat Rowland       </em></p>
<p><strong>Follow our news on Google!</strong> For current, interesting, and accurate information, <a href="https://www.google.com/search?q=site:bitfinance.news&amp;tbm=nws&amp;tbs=sbd:1" target="_blank" rel="noopener"><strong>click here</strong></a> to see all the content on <strong>Bitfinance.news</strong>. You can also find us on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/lets-reduce-risks-how-cybercriminals-use-stolen-information/">Let&#8217;s reduce risks: How cybercriminals use stolen information</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity: The malware that most attacked Android smartphones</title>
		<link>https://bitfinance.news/en/cybersecurity-the-malware-that-most-attacked-android-smartphones/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 12 Jan 2026 13:00:40 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[Advanced and Permanent Users]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[Basic and Occasional Users]]></category>
		<category><![CDATA[cell phones]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[education]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latam]]></category>
		<category><![CDATA[ESET Vzla]]></category>
		<category><![CDATA[Martina López]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Researcher]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=118511</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1920" height="1213" src="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-DESTACADA-Los-malware-que-mas-atacaron-a-telefonos-Android-en-2025-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET señala que exploit antiguos y troyanos adaptados siguen dominando el ecosistema Android en América Latina, impulsados por dispositivos desactualizados y canales de distribución inseguros" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-DESTACADA-Los-malware-que-mas-atacaron-a-telefonos-Android-en-2025-Suministrada-por-ESET-y-Comstat-R.jpg 1920w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-DESTACADA-Los-malware-que-mas-atacaron-a-telefonos-Android-en-2025-Suministrada-por-ESET-y-Comstat-R-300x190.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-DESTACADA-Los-malware-que-mas-atacaron-a-telefonos-Android-en-2025-Suministrada-por-ESET-y-Comstat-R-1024x647.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-DESTACADA-Los-malware-que-mas-atacaron-a-telefonos-Android-en-2025-Suministrada-por-ESET-y-Comstat-R-768x485.jpg 768w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-DESTACADA-Los-malware-que-mas-atacaron-a-telefonos-Android-en-2025-Suministrada-por-ESET-y-Comstat-R-1536x970.jpg 1536w" sizes="(max-width: 1920px) 100vw, 1920px" /></div><p>In Latin America, the mobile landscape has very clear characteristics. The region concentrates many malware detections for Android, focusing on Mexico and Brazil, according to the latest ESET Threat Report. Unlike more northerly regions or Europe, Android is the most prevalent operating system by a significant margin. In line with what ESET, a leading company [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/cybersecurity-the-malware-that-most-attacked-android-smartphones/">Cybersecurity: The malware that most attacked Android smartphones</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1920" height="1213" src="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-DESTACADA-Los-malware-que-mas-atacaron-a-telefonos-Android-en-2025-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET señala que exploit antiguos y troyanos adaptados siguen dominando el ecosistema Android en América Latina, impulsados por dispositivos desactualizados y canales de distribución inseguros" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-DESTACADA-Los-malware-que-mas-atacaron-a-telefonos-Android-en-2025-Suministrada-por-ESET-y-Comstat-R.jpg 1920w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-DESTACADA-Los-malware-que-mas-atacaron-a-telefonos-Android-en-2025-Suministrada-por-ESET-y-Comstat-R-300x190.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-DESTACADA-Los-malware-que-mas-atacaron-a-telefonos-Android-en-2025-Suministrada-por-ESET-y-Comstat-R-1024x647.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-DESTACADA-Los-malware-que-mas-atacaron-a-telefonos-Android-en-2025-Suministrada-por-ESET-y-Comstat-R-768x485.jpg 768w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-DESTACADA-Los-malware-que-mas-atacaron-a-telefonos-Android-en-2025-Suministrada-por-ESET-y-Comstat-R-1536x970.jpg 1536w" sizes="(max-width: 1920px) 100vw, 1920px" /></div><p style="text-align: justify;">In <strong>Latin America</strong>, the mobile landscape has very clear characteristics. The region concentrates many malware detections for Android, focusing on <strong>Mexico and Brazil,</strong> according to the latest <a href="https://www.welivesecurity.com/es/informes/eset-threat-report-h2-2025/" target="_blank" rel="noopener">ESET Threat Report</a>. Unlike more northerly regions or Europe, Android is the most prevalent operating system by a significant margin. In line with what <a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a>, a leading company in proactive threat detection, observes globally, <strong>the phone is the primary device for most people,</strong> and recent devices coexist with models that no longer receive updates. According to the research group, this mix of high dependency, fragmentation, and outdated versions creates <strong>an environment where many malicious codes find space to proliferate.</strong> This is an issue <strong>we should all be aware of, whether we are basic and occasional users or advanced and active ones.</strong></p>
<p style="text-align: justify;"><em>“In addition, many of the most effective distribution channels remain fully operational in the region. SMS or messaging campaigns with direct links, modified APKs shared outside of official stores, and applications that manage to enter legitimate stores with very few reviews or signs of real activity continue to be key vectors. This ecosystem facilitates both the circulation of known malware families and the constant emergence of new or unsophisticated variants that still manage to gain traction,”</em> comments <strong>Martina Lopez, Cybersecurity Researcher at ESET Latin America.</strong></p>
<figure id="attachment_118508" aria-describedby="caption-attachment-118508" style="width: 1493px" class="wp-caption alignnone"><img decoding="async" class="wp-image-118508 size-full" src="https://bitfinance.news/wp-content/uploads/2026/01/Distribucion-geografica-de-las-detecciones-de-Android.-ESET-Threat-Report-H2-2025.jpg" alt="Geographic distribution of Android detections. ESET Threat Report H2 2025" width="1493" height="658" srcset="https://bitfinance.news/wp-content/uploads/2026/01/Distribucion-geografica-de-las-detecciones-de-Android.-ESET-Threat-Report-H2-2025.jpg 1493w, https://bitfinance.news/wp-content/uploads/2026/01/Distribucion-geografica-de-las-detecciones-de-Android.-ESET-Threat-Report-H2-2025-300x132.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/01/Distribucion-geografica-de-las-detecciones-de-Android.-ESET-Threat-Report-H2-2025-1024x451.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/01/Distribucion-geografica-de-las-detecciones-de-Android.-ESET-Threat-Report-H2-2025-768x338.jpg 768w" sizes="(max-width: 1493px) 100vw, 1493px" /><figcaption id="caption-attachment-118508" class="wp-caption-text">Geographic distribution of Android detections. ESET Threat Report H2 2025</figcaption></figure>
<p>&nbsp;</p>
<h3>ESET analyzes the 3 most frequently detected malware families in the region during 2025</h3>
<p style="text-align: justify;"><strong>Trojan.Android/Exploit.CVE-2012-6636:</strong> An old vulnerability that remains present in the mobile ecosystem because many Android applications continue to use legacy components. The flaw affects apps that use WebView with an insecure configuration and that were compiled with versions prior to Android 4.2. Even if the device is modern, the application may retain this vulnerable behavior. In this context, a malicious webpage loaded within the WebView itself can interact with the app&#8217;s internal code in ways that should not be possible, <strong>opening the door to the execution of unauthorized actions.</strong></p>
<p style="text-align: justify;">In the current mobile threat landscape, this exploit is not usually the focus of complex campaigns, but it does appear embedded in APKs distributed outside of official app stores or present in applications that no longer receive updates. Publicly available exploits exist for CVE-2012-6636, including modules embedded in frameworks like Metasploit, making it easy for malicious actors to use. Furthermore, it was reported as one of the most prevalent Android exploits in 2023, according to the <a href="https://web-assets.esetstatic.com/wls/es/articulos/reportes/eset-security-report-2024-es.pdf" target="_blank" rel="noopener">ESET Security Report 2024</a>.</p>
<p style="text-align: justify;"><strong>Trojan.Android/Exploit.Lotoor:</strong> This is a family of privilege escalation exploits used for over a decade to gain root access on Android devices. It encompasses a set of techniques that <strong>abuse operating system vulnerabilities in various early versions of Android,</strong> especially flaws discovered between 2010 and 2013. Under this umbrella are exploits that take advantage of errors in drivers, system services, or memory management, allowing code to be executed with privileges higher than those of the application.</p>
<p style="text-align: justify;">Its modules continue to reappear within malicious tools that <strong>seek to activate advanced functions such as uninstalling security apps, modifying internal configurations, or installing additional payloads.</strong> This is not the first time the research team has observed Lotoor in the top spots.</p>
<p style="text-align: justify;"><strong>Trojan.Android/Pandora:</strong> This is malicious code linked to a variant of Mirai adapted for the Android ecosystem. It was first observed in 2023 within popular streaming applications in the region, especially on Android TV boxes and sticks commonly used to access unofficial content. In these cases,<strong> attackers distribute APKs that function as legitimate streaming apps</strong> but include a malicious component capable of turning the device into part of a botnet. In some models, modified firmware was even detected that came infected from the factory, amplifying the reach of the attack.</p>
<p style="text-align: justify;">Once installed, Pandora maintains communication with a command and control server, receives instructions, and executes the typical capabilities of a Mirai-based botnet, with the focus on launching <strong>distributed denial-of-service attacks.</strong></p>
<figure id="attachment_118509" aria-describedby="caption-attachment-118509" style="width: 871px" class="wp-caption alignnone"><img decoding="async" class="wp-image-118509 size-full" src="https://bitfinance.news/wp-content/uploads/2026/01/Solicitud-de-privilegios-elevados-hecha-por-una-variante-de-Pandora-suplantando-a-la-app-Tele-Latino.-Fuente-ESET-Threat-Report-2023.jpg" alt="Request for elevated privileges made by a variant of Pandora impersonating the Tele Latino app. Source: ESET Threat Report 2023" width="871" height="732" srcset="https://bitfinance.news/wp-content/uploads/2026/01/Solicitud-de-privilegios-elevados-hecha-por-una-variante-de-Pandora-suplantando-a-la-app-Tele-Latino.-Fuente-ESET-Threat-Report-2023.jpg 871w, https://bitfinance.news/wp-content/uploads/2026/01/Solicitud-de-privilegios-elevados-hecha-por-una-variante-de-Pandora-suplantando-a-la-app-Tele-Latino.-Fuente-ESET-Threat-Report-2023-300x252.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/01/Solicitud-de-privilegios-elevados-hecha-por-una-variante-de-Pandora-suplantando-a-la-app-Tele-Latino.-Fuente-ESET-Threat-Report-2023-768x645.jpg 768w" sizes="(max-width: 871px) 100vw, 871px" /><figcaption id="caption-attachment-118509" class="wp-caption-text">Request for elevated privileges made by a variant of Pandora impersonating the Tele Latino app. Source: ESET Threat Report 2023</figcaption></figure>
<p>&nbsp;</p>
<p style="text-align: justify;"><em>“This 2025 outlook shows us that Android threats continue to rely on well-known vectors and the <strong>lack of device and application updates,</strong> which keeps exploits and vulnerabilities that have been circulating for years alive. Even so, this doesn&#8217;t mean the risk is limited to the usual suspects. Less widespread, but equally relevant, <strong>threats also persist, such as banking trojans or fraudulent lending apps, which operate in a much more targeted way and seek a direct impact on the user&#8217;s finances.</strong> And, in parallel, emerging threats and increasingly innovative techniques are appearing, such as <strong><a href="https://www.welivesecurity.com/es/seguridad-moviles/malware-android-clona-tarjetas-por-nfc-brasil/" target="_blank" rel="noopener">malware capable of cloning cards via NFC</a>,</strong> reflecting a constantly evolving mobile ecosystem with a growing level of sophistication,”</em> concludes Lopez from ESET Latin America.</p>
<p style="text-align: justify;">In this context, protecting information and devices from these threats becomes vital.</p>
<h3 style="text-align: left;">ESET shares the following tips to avoid becoming a victim</h3>
<ul style="text-align: justify;">
<li style="text-align: justify;">Keep your device updated and don&#8217;t use older versions of Android if an update is available.</li>
<li>Install applications only from official stores or verified sources.</li>
<li>Avoid APKs from unknown sources, even if they promise “premium” features or free content.</li>
<li>Check permissions, developer activity, and the actual number of reviews before installing an app.</li>
<li>Use <a href="https://www.eset.com/latam/hogar/" target="_blank" rel="noopener">reliable security solutions</a> that detect exploits, Trojans, and anomalous behavior.</li>
<li>Avoid disabling system protections and prevent the installation of unknown apps.</li>
<li>Be wary of messages, links, or ads that promise quick access, discounts, or special features.</li>
</ul>
<p style="text-align: justify;">ESET invites you to learn more about cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: justify;">For other useful preventative information, also available in Venezuela: <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and on their social media channels @eset_ve. Also on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p><em>Bitfinance.news</em></p>
<p>(With information and images provided by ESET and Comstat Rowland)</p>
<p><em>Visit our news channel on </em><a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><em><strong>Google News</strong></em></a><em> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on </em><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><em><strong>X/Twitter</strong></em></a><em> and </em><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><em><strong>Instagram</strong></em></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/cybersecurity-the-malware-that-most-attacked-android-smartphones/">Cybersecurity: The malware that most attacked Android smartphones</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
