Feeds

Bogus Android markets seized in FBI software crackdown

'You wouldn't steal an Android app...'

  • alert
  • submit to reddit

Protecting users from Firesheep and other Sidejacking attacks with SSL

The US Department of Justice reports that three domains selling stolen Android applications have been seized in a combined operation by the FBI and international police.

Visitors to applanet.net, appbucket.net, and snappzmarket.com hoping for hooky apps will be disappointed to see the FBI's warning page showing that the Feds now hold the rights to the sites. The FBI coordinated the shutdown with French and Italian police, who filed nine warrants for arrest and seized local servers to shut down the illegal app stores and preserve evidence about those running them.

FBI domain warning

No apps for you says FBI

"The theft of intellectual property, particularly within the cyber arena, is a growing problem and one that cannot be ignored by the US government’s law enforcement community," said FBI special agent in charge Brian Lamkin. "These thefts cost companies millions of dollars and can even inhibit the development and implementation of new ideas and applications."

Hopefully this isn't going to mean a warning screen every time you download a new piece of software, in the same way you can't seem to buy a DVD without a dire warning from the Feds – marvelously lampooned by The IT Crowd – that you may be a pirate.

In a statement, the DOJ reports that FBI agents downloaded thousands of applications from legitimate developers that had been cracked and then put back on sale. As is the way of things with these markets, El Reg is willing to bet they got a fair chunk of malware samples as well.

"Cracking down on piracy of copyrighted works – including popular apps – is a top priority of the Criminal Division," said Assistant Attorney General Breuer from the Department of Justice.

"Software apps have become an increasingly essential part of our nation’s economy and creative culture, and the Criminal Division is committed to working with our law enforcement partners to protect the creators of these apps and other forms of intellectual property from those who seek to steal it." ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.