Feeds

Six in Tokyo slammer after Android smut scam

Malware was distributed through adult site

Next gen security for virtualised datacentres

Six men including three IT executives have been arrested in Tokyo in connection with an Android malware scam which netted them over 20 million yen (£160,740).

Japan’s first arrests for the crime of distributing a smartphone virus came after over 9,000 people downloaded malware disguised as an application designed to play videos, according to the Daily Yomiuri.

The group, which is also being investigated on suspicion of developing the virus, decided to distribute it on an adult site it created, presumably luring victims into paying with the promise of being able to view video content.

Once downloaded onto a user’s phone, the app displayed a message demanding payment of 99,800 yen (£803), with the notice continuing to be displayed even when the victim tried to turn the device off.

The group also allegedly nicked personal data from the phone including contact information from the address book, and stored it on a server overseas, the report added.

The news highlights the continued threat to Android-based smartphones – one which becomes more alarming for IT managers given that many such devices are being used to access corporate networks as part of BYOD initiatives.

Tokyo-headquartered security vendor Trend Micro said Android malware grew by a whopping 1410 per cent in the first half of 2011.

Although only a very small number of the 400,000+ apps on Google Play are likely to be harmful, security professionals usually advise users to avoid third party app stores and other sites where malware is more likely to lurk.

The Chinese government has even been forced to voice concerns about security issues in app stores owned by state-run operators China Mobile and China Telecom. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.