Feeds

Russian Feds close in on Pinch Trojan authors

Tales from the Underground

Choosing a cloud hosting partner with confidence

Russian authorities have identified the authors of the notorious Pinch malware creation toolkit. Arrests are expected to follow.

Pinch is a Trojan creation toolkit that is reckoned to have been used by virus writers to infect tens of millions of PCs. The toolkit is sold in black market hacking forums. Script kiddies were able to order a customised version of the Trojan, as well as purchasing 'technical support' from the authors of the program. Russian hacker forums were flooded with ads for this 'service'.

Russian anti-virus firm Kaspersky Lab reports that Russian law enforcement officials are closing in on the individuals behind the malware.

Nikolay Patrushev, head of Russia's Federal Security Services, said that the authors of the infamous Pinch Trojan have been identified as two Russian VXers, called Ermishkin and Farkhutdinov. "The investigation will soon be completed and taken to court," Patrushev said.

However, as Kaspersky points out, the prosecution of the Pinch authors (while welcome) is unlikely to have much impact on the password-stealing Trojan scene.

"Unfortunately, it doesn't mean that new variants of Pinch will disappear," it notes. "Sadly, the source code of this Trojan is circulating on the internet, and we'll certainly encounter 'remakes' of this pest, created by virus writers who have not yet been arrested." ®

Beginner's guide to SSL certificates

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?