Members
  • Total Members: 14176
  • Latest: toxxxa
Stats
  • Total Posts: 42869
  • Total Topics: 16078
  • Online Today: 3770
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 01. January 2015., 10:21:50 »



Malware-slingers have latched onto the torrent of publicity spawned by the controversial film The Interview by stitching together a fake Android app actually designed to swipe online banking credentials.

Sony Pictures, stung by criticism that it had given into threats in the wake of a devastating hack attack against its systems, reversed its decision to shelve The Interview and released the North Korean-baiting Seth Rogen comedy on Christmas Day, as originally planned. The movie played the sell-out audiences in a limited number of theatres and well as enjoying a release online, through both official and unofficial channels.

But one of the illegal torrents making the rounds in South Korea poses as an Android app to download the movie. In reality the software is attempting to exploit the media frenzy surrounding The Interview by pushing an Android Trojan detected by McAfee products as Android/Badaccents.

The banking Trojan is programmed to target customers of a number of Korean banks, as well as Citi Bank. Approximately 20,000 devices appear to have been infected to date, based on bank account data from infected Android devices relayed back to a Chinese mail server and intercepted by security researchers.

The malware is programmed to check the device’s manufacturer, bypassing infection routines and displaying a failed connection message if either Samjiyon or Arirang smartphone devices are detected. Both manufacturers sell Android devices in North Korea.

However, McAfee security researcher Irfan Asrar reckons the routine is designed by cybercrooks to weed out potential targets from North Korea, who are obviously unlikely to have online banking accounts, rather than anything more political, such as an attempt to identify those interested by a “decadent Western film” that has incensed the ruling cadre in Pyongyang.

The threat was detected by researchers at McAfee during a joint investigation with the Technische Universität Darmstadt and the Centre for Advanced Security Research Darmstadt. The banking Trojan was hosted on Amazon Web Services. McAfee has notified the cloud computing giant of threat. This abuse is incidental rather than central to the scam and it’s quite possible that the malware will reappear elsewhere, possibly under a different disguise.

Virus distributors regularly latch onto newsworthy events ranging from celebrity deaths to natural disasters as a means of grabbing attention for their nefarious wares.

A write-up of the latest such threat - complete with screenshots - can be found in a blog post by veteran security researcher Graham Cluley here: http://grahamcluley.com/2014/12/the-interview-android-app-malware

(ElReg)
Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising