Feeds

Hentai malware publishes web history of marks online

Tentacle-smut shakedown

Securing Web Applications Made Simple and Scalable

A Trojan circulating in Japan seeks to extort money from shame-faced fans of hentai-themed games.

Those who download illegal copies of ”over 18″ hentai-themed games from file sharing networks are liable to wind up with a nasty surprise, Trend Micro warns.

Some bogus files posing as games from Abel software attempt to trick victims into handing over personal information as part of a supposed game registration process. Meanwhile, in the background, the malware is collecting information on the victim's computer including domain, OS version, file use history and IE favourites.

Screenshots from a prospective mark's PC are also obtained.
 
This data is then published on a publicly-viewable website before victims receive an email pointing them towards the incriminating content from Romancing Inc, which also maintains the domain hosting the incriminating data.

The email offers to resolve the “copyright infringement” and remove incriminating (and potentially embarrassing) information in exchange for a fee.

Trend Micro notes that the Trojan forming the centrepiece of the attack drops MP3 files on a victim's machine that are elsewhere offered for sale online at an extortionate price of hundreds of thousands of dollars.

Security researcher Rik Ferguson writes: "Could it be that once a victim has shown themselves to be extortion-friendly they will get hit with yet another 'copyright infringement' notice from Romancing Inc? Japanese copyright law was strengthened this year largely in an attempt to address the problem of illegal downloading.

"This is certainly another illustration of why, in the long run, you may well be better off paying up front for your downloads and steering clear of file-sharing networks."

Previous scams along the same lines have claimed to be FBI notices of copyright infringement. The Hentai-themed ruse goes further by publicly shaming prospective marks before hitting them with extortionate demands.

More on the web-based smut shakedown can be found in a blog posting by Trend Micro here. ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.