Feeds

Six in Tokyo slammer after Android smut scam

Malware was distributed through adult site

The Power of One eBook: Top reasons to choose HP BladeSystem

Six men including three IT executives have been arrested in Tokyo in connection with an Android malware scam which netted them over 20 million yen (£160,740).

Japan’s first arrests for the crime of distributing a smartphone virus came after over 9,000 people downloaded malware disguised as an application designed to play videos, according to the Daily Yomiuri.

The group, which is also being investigated on suspicion of developing the virus, decided to distribute it on an adult site it created, presumably luring victims into paying with the promise of being able to view video content.

Once downloaded onto a user’s phone, the app displayed a message demanding payment of 99,800 yen (£803), with the notice continuing to be displayed even when the victim tried to turn the device off.

The group also allegedly nicked personal data from the phone including contact information from the address book, and stored it on a server overseas, the report added.

The news highlights the continued threat to Android-based smartphones – one which becomes more alarming for IT managers given that many such devices are being used to access corporate networks as part of BYOD initiatives.

Tokyo-headquartered security vendor Trend Micro said Android malware grew by a whopping 1410 per cent in the first half of 2011.

Although only a very small number of the 400,000+ apps on Google Play are likely to be harmful, security professionals usually advise users to avoid third party app stores and other sites where malware is more likely to lurk.

The Chinese government has even been forced to voice concerns about security issues in app stores owned by state-run operators China Mobile and China Telecom. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.