03 August 2013 | 17:54

Russia home to text message fraud "cottage industry"

viewings icon comments icon

ПОДЕЛИТЬСЯ

whatsapp button telegram button facebook button

Researchers have discovered that bilking people by infecting Android mobile phones with viruses has become a cottage industry in Russia in a criminal model that could be replicated elsewhere, AFP reports. Members of Lookout Mobile Security were at the infamous Def Con hacker gathering in Las Vegas on Friday to share what they uncovered about a text-messaging fraud operation they dubbed "Dragon Lady" in reference to Cold War-era US military reconnaissance aircrafts. "The mobile malware trade in Russia is highly organized and profitable," Lookout said, referring to malicious software designed to infect smartphones. "We recently investigated a veritable industry of malware businesses with startup-like behaviors." Businesses referred to as 'Malware HQs' accounted for more than half the overall mobile malware detections by Lookout during the first six months of this year, according to researcher Ryan Smith. Malware HQs openly recruit 'affiliates' that could be anyone and provide simple do-it-yourself tools to distribute viruses with tactics such as booby-trapped websites or Twitter posts. Once on smartphones, viruses fire off premium text messages behind the scenes, with HQs getting the money and sharing it with affiliates who hooked the victims. Lookout discovered that some HQs promote playful competition between affiliates with websites that show rankings and promise prizes for top performers. "We've seen evidence that these affiliate marketers have earned between $700 a month to $12,000 a month from these scams," Smith said in a report summarizing Lookout's findings. He estimated that there are thousands of individual distributors and potentially tens of thousands of affiliate websites promoting custom SMS malware. "Malware HQs handle the tough stuff like releasing new Android code and configurations every two weeks, malware hosting, shortcode registration, and marketing campaign management tools," Smith said in his summary. "Like any other large business, Malware HQ organizations provide customer support, post regular newsletters, report downtime or new features, and even run regular contests to keep their affiliates engaged and motivated." Those falling prey to the scam were typically Russian speaking Android phone users searching online for free games, applications, music, videos or pornography, according to Lookout. Pages rigged with malware are designed to reject visits from countries not targeted by the crooks, who prefer victims in places where fees for premium text messages are paid immediately instead of through billing by telecom service providers. While the text-messaging malware industry appeared centered in Russia, the model could be duplicated in other countries where conditions allow, according to Lookout. gc/rcw

whatsapp button telegram button facebook button copyLink button
Иконка комментария блок соц сети
Researchers have discovered that bilking people by infecting Android mobile phones with viruses has become a cottage industry in Russia in a criminal model that could be replicated elsewhere, AFP reports. Members of Lookout Mobile Security were at the infamous Def Con hacker gathering in Las Vegas on Friday to share what they uncovered about a text-messaging fraud operation they dubbed "Dragon Lady" in reference to Cold War-era US military reconnaissance aircrafts. "The mobile malware trade in Russia is highly organized and profitable," Lookout said, referring to malicious software designed to infect smartphones. "We recently investigated a veritable industry of malware businesses with startup-like behaviors." Businesses referred to as 'Malware HQs' accounted for more than half the overall mobile malware detections by Lookout during the first six months of this year, according to researcher Ryan Smith. Malware HQs openly recruit 'affiliates' that could be anyone and provide simple do-it-yourself tools to distribute viruses with tactics such as booby-trapped websites or Twitter posts. Once on smartphones, viruses fire off premium text messages behind the scenes, with HQs getting the money and sharing it with affiliates who hooked the victims. Lookout discovered that some HQs promote playful competition between affiliates with websites that show rankings and promise prizes for top performers. "We've seen evidence that these affiliate marketers have earned between $700 a month to $12,000 a month from these scams," Smith said in a report summarizing Lookout's findings. He estimated that there are thousands of individual distributors and potentially tens of thousands of affiliate websites promoting custom SMS malware. "Malware HQs handle the tough stuff like releasing new Android code and configurations every two weeks, malware hosting, shortcode registration, and marketing campaign management tools," Smith said in his summary. "Like any other large business, Malware HQ organizations provide customer support, post regular newsletters, report downtime or new features, and even run regular contests to keep their affiliates engaged and motivated." Those falling prey to the scam were typically Russian speaking Android phone users searching online for free games, applications, music, videos or pornography, according to Lookout. Pages rigged with malware are designed to reject visits from countries not targeted by the crooks, who prefer victims in places where fees for premium text messages are paid immediately instead of through billing by telecom service providers. While the text-messaging malware industry appeared centered in Russia, the model could be duplicated in other countries where conditions allow, according to Lookout. gc/rcw
Читайте также
Join Telegram Последние новости
The Moon is calling: New lunar mission
Wolf attacked man in Atyrau region
Euronews office opened in Astana
Earthquake recorded in Zhambyl region
Tokayev sent telegram to Qatar’s Emir
A New Year gift guide for her
Tokayev expressed condolences to Macron
Bitcoin exchange rate hit a new record
Лого TengriNews мобильная Лого TengriSport мобильная Лого TengriLife мобильная Лого TengriAuto мобильная Иконка меню мобильная
Иконка закрытия мобильного меню
Открыть TengriNews Открыть TengriLife Открыть TengriSport Открыть TengriTravel Открыть TengriGuide Открыть TengriEdu Открыть TengriAuto

Exchange Rates

 523.95  course up  543.16  course up  5.1  course up

 

Weather

 

Редакция Advertising
Социальные сети
Иконка Instagram footer Иконка Telegram footer Иконка Vkontakte footer Иконка Facebook footer Иконка Twitter footer Иконка Youtube footer Иконка TikTok footer Иконка WhatsApp footer