Feeds

Hentai malware publishes web history of marks online

Tentacle-smut shakedown

Next gen security for virtualised datacentres

A Trojan circulating in Japan seeks to extort money from shame-faced fans of hentai-themed games.

Those who download illegal copies of ”over 18″ hentai-themed games from file sharing networks are liable to wind up with a nasty surprise, Trend Micro warns.

Some bogus files posing as games from Abel software attempt to trick victims into handing over personal information as part of a supposed game registration process. Meanwhile, in the background, the malware is collecting information on the victim's computer including domain, OS version, file use history and IE favourites.

Screenshots from a prospective mark's PC are also obtained.
 
This data is then published on a publicly-viewable website before victims receive an email pointing them towards the incriminating content from Romancing Inc, which also maintains the domain hosting the incriminating data.

The email offers to resolve the “copyright infringement” and remove incriminating (and potentially embarrassing) information in exchange for a fee.

Trend Micro notes that the Trojan forming the centrepiece of the attack drops MP3 files on a victim's machine that are elsewhere offered for sale online at an extortionate price of hundreds of thousands of dollars.

Security researcher Rik Ferguson writes: "Could it be that once a victim has shown themselves to be extortion-friendly they will get hit with yet another 'copyright infringement' notice from Romancing Inc? Japanese copyright law was strengthened this year largely in an attempt to address the problem of illegal downloading.

"This is certainly another illustration of why, in the long run, you may well be better off paying up front for your downloads and steering clear of file-sharing networks."

Previous scams along the same lines have claimed to be FBI notices of copyright infringement. The Hentai-themed ruse goes further by publicly shaming prospective marks before hitting them with extortionate demands.

More on the web-based smut shakedown can be found in a blog posting by Trend Micro here. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New twist as rogue antivirus enters death throes
That's not the website you're looking for
ISIS terror fanatics invade Diaspora after Twitter blockade
Nothing we can do to stop them, says decentralized network
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.