Money-making malware to watch for in 2013
Fortinet today announced the findings of its FortiGuard threat landscape research for the period of October 1 − December 31, 2012. FortiGuard Labs has highlighted malware samples that show four typical methods cyber criminals are using today to extract money from their victims. In addition, the report shows increasing activity in mobile malware variants of the Android Plankton ad kit.
Four Money-Making Malware to Watch for in 2013
In the last three months, FortiGuard Labs has identified four pieces of malware that spiked, showing high levels of activity within a very short period of time (from a day to a week). The following examples reflect four typical methods cyber criminals are using today to monetize their malware:
Simda.B: This sophisticated malware poses as a Flash update in order to trick users into granting their full installation rights. Once installed, the malware steals the user’s passwords, allowing cybercriminals to infiltrate a victim’s email and social networking accounts to spread spam or malware, access Website admin accounts for hosting malicious sites and siphon money from online payment system accounts.
FakeAlert.D: This fake antivirus malware notifies users via a convincing-looking pop-up window that their computer has been infected with viruses, and that, for a fee, the fake antivirus software will remove the viruses from the victim’s computer.
Ransom.BE78: This is ransomware, a frustrating piece of malware that prevents users from accessing their personal data. Typically the infection either prevents a user’s machine from booting or encrypts data on the victim’s machine and then demands payment for the key to decrypt it. The main difference between ransomware and fake antivirus is that ransomware does not give the victim a choice regarding installation. Ransomware installs itself on a user’s machine automatically and then demands payment to be removed from the system.
Zbot.ANQ: This Trojan is the “client-side” component of a version of the infamous Zeus crime-kit. It intercepts a user’s online bank login attempts and then uses social engineering to trick them into installing a mobile component of the malware on their smartphones. Once the mobile element is in place, cybercriminals can then intercept bank confirmation SMS messages and subsequently transfer funds to a money mule’s account.
“While methods of monetizing malware have evolved over the years, cybercriminals today seem to be more open and confrontational in their demands for money − for faster returns,” said Guillaume Lovet, senior manager of FortiGuard Labs’ Threat Response Team. “Now it’s not just about silently swiping passwords, it’s also about bullying infected users into paying. The basic steps users can take to protect themselves, however, have not changed. They should continue to have security solutions installed on their computers, update their software diligently with the latest versions and patches, run regular scans and exercise common sense.”
Android Mobile Advertising Malware
In the last threat landscape report, FortiGuard Labs detected a surge in the distribution of the Android Plankton ad kit. This particular piece of malware embeds a common toolset on a user’s android device that serves unwanted advertisements in the user’s status bar, tracks the user’s International Mobile Equipment Identity (IMEI) number and drops icons on the device’s desktop.
In the last three months, the kit’s activity plunged. In its place, FortiGuard Labs has detected the rise of ad kits that appear to be directly inspired by Plankton and have approached the same elevated activity level Plankton was operating at three months ago.
“The ad kits we’ve monitored suggest that Plankton’s authors are trying to dodge detection. Either that, or competing ad kit developers are trying to take a piece of the lucrative adware cake. Either way, the level of activity we’re seeing with ad kits today suggests that Android users are highly targeted and thus should be especially vigilant when downloading apps to their smartphones,” said Lovet.
- Skybox Finds Cryptomining Malware Now Dominates Threat landscape
- Battling Cyber Risks With Intelligent Automation
- Cyber GCCs In India At The Cusp Of Transformation
- Five Key Takeaways From Cisco India Summit 2018
- Firms Unable To Cope With Security Skill Gap, Vendor Sprawl: Study
- Govt Projects To Drive India's Networking Market: IDC
- Smart Digital Media Marketing Without Losing Human Touch
- Indians Lack Awareness Of Malicious Cryptomining: Study
- Adoption of Social Business Models Growing, Says ISG
- Why Blockchain Experts Should Rethink Cybersecurity