If you haven’t heard of “ransom ware”, you need to pay attention to this story. Spanish officials have taken down a gang who specializes in a virus that hold user;s data for ransom:
The gang, operating from the Mediterranean resort cities of Benalmadena and Torremolinos, made at least $1.35 million annually, said Deputy Interior Minister Francisco Martinez. Their notices to victims were accompanied by false threats claiming they were under investigation for accessing child pornography or illegal file-sharing.
The 27-year-old Russian alleged to be the gang’s founder and virus developer was detained in the United Arab Emirates at the request of Spanish police while on vacation and an extradition petition is pending, Martinez said. Six more Russians, two Ukrainians and two Georgians were arrested in Spain last week.
Europol, which coordinates national police forces across Europe and worked with Spanish authorities on the case, said the operation “dismantled the largest and most complex cybercrime network dedicated to spreading police ransomware.”
Sounds delightful doesn’t it? Here’s how the scam which was propagated via a virus worked:
The virus displayed the national emblem of the police force in each country it appeared, telling people to buy prepaid electronic money cards to pay the fines online.
Authorities estimate less than three per cent of those people whose computers were infected paid, but the amounts added up. The gang also stole data and information from victims’ computers, and didn’t unlock them after the fake fines were paid.
Money was also stolen from the victims’ accounts via ATMs in Spain, and the gang made daily international money transfers through currency exchanges and call centers to send the funds stolen to Russia.
This is another reason to make sure that the security on your computer is up to snuff so that you don’t fall victim to something like this.
Android Backdoor ‘GhostCtrl’ Can Silently Record Your Audio, Video and More
Posted in Commentary with tags Android, virus on July 19, 2017 by itnerdResearchers over at Trend Micro have discovered a new Android backdoor that at first glance, seems scary:
The information-stealing RETADUP worm that affected Israeli hospitals is actually just part of an attack that turned out to be bigger than we first thought—at least in terms of impact. It was accompanied by an even more dangerous threat: an Android malware that can take over the device.
Detected by Trend Micro as ANDROIDOS_GHOSTCTRL.OPS / ANDROIDOS_GHOSTCTRL.OPSA, we’ve named this Android backdoor GhostCtrl as it can stealthily control many of the infected device’s functionalities.
There are three versions of GhostCtrl. The first stole information and controlled some of the device’s functionalities without obfuscation, while the second added more device features to hijack. The third iteration combines the best of the earlier versions’ features—and then some. Based on the techniques each employed, we can only expect it to further evolve.
Lovely. The malware distributes itself via illegitimate apps for WhatsApp or Pokemon GO. Trend Micro suggests you keep your Android devices up to date and data backed up regularly. They also recommend using an app reputation system that can detect suspicious and malicious apps. In other words, this is a real and present threat and I am sure that we’ll see threats just like this one in the not too distant future.
Leave a comment »