Articles about Counterfeit

Fitbit throws fit, emits writ for outfit's non-hit, rather sh*t, 'Fitbit' kit

Fitbit has sued a company it accuses of deliberately selling shoddy units. In a complaint [PDF] filed to the Northern California District Court, the San Francisco-based wearables giant claims Laguna 2 (L2), a reseller in New Jersey, repackaged and sold Fitbit equipment it knew was defective. According to Fitbit's complaint, …
Shaun Nichols, 10 Jan 2017
I AM NIKOM / Shutterstock.com

New Android-infecting malware brew hijacks devices. Why, you ask? Your router

Hackers have brewed up a strain of Android malware that uses compromised smartphones as conduits to attack routers. The Switcher trojan does not attack Android device users directly. Instead, the malware uses compromised smartphones and tablets as tools to attack any wireless networks they connect to. Switcher brute-forces …
John Leyden, 03 Jan 2017
Made in China

We've been Trumped! China's Alibaba is a 'notorious' knock-offs souk, says US watchdog

The United States Trade Representative (USTR) has put Alibaba's Taobao, the Chinese internet giant's online auction site, on its "notorious markets list" of sites that regularly deal in counterfeit goods. In a bulletin this week [PDF] the USTR noted that Taobao, which is the world's largest online shopping destination by gross …
Iain Thomson, 22 Dec 2016
Auctioneer with hammer

Bayrob: Romanian auction fraud suspects extradited to the US

Three suspected cybercriminals have been arrested and extradited from Romania to the US over a multi-million dollar malware-facilitated scams. The suspects are believed to be members of a gang, nicknamed Bayrob by Symantec researchers, which allegedly earned a living from online fraud for nearly a decade. The indictment claims …
John Leyden, 19 Dec 2016
A man handcuffed to a briefcase

Chinese chap in the clink for trying to swap US Navy FPGAs with fakes to beat export ban

A Chinese national starts a 15-month stretch behind bars for trying to swap reprogrammable chips destined for the US Navy with fakes, and smuggle the real gear out of the country. Xianfeng Zuo, 38, was sentenced on Friday in Connecticut after he pleaded guilty to conspiracy to traffic in counterfeit goods. Zuo, of Shenzhen, …
Shaun Nichols, 07 Nov 2016
shutterstock_popcorn_cat

More movie and TV binge-streaming sites join UK banned list

Thirteen more pirate sites have have been added to the list of domains that the largest UK ISPs must block*. This time the target sites are dedicated to binge-watching TV series and theatrical run films. Although nobody in the movie and TV business – which is fuelling a tech jobs boom in the UK – claims it's the only solution …
Andrew Orlowski, 01 Nov 2016

Forget malware, crooks are cracking ATMs the old-fashioned way – with explosives

Bank raiders are increasingly turning to explosives in order to break into cash machines. The European ATM Security Team (EAST) reports that ATM explosive attacks were up 80 per cent in the first half of 2016 compared to the same period last year. A total of 492 explosive attacks were reported, up from 273 during the same …
John Leyden, 14 Oct 2016
Game of Thrones

Fingerprint tech makes ATMs super secure, say banks. Crims: Bring it on, suckers

Cybercriminals are hawking their claimed ability to exploit newly introduced biometric-based ATM authentication technologies. Many banks view biometric-based technologies such as fingerprint recognition to be one of the most promising additions to current authentication methods, if not a complete replacement to chip and PIN. …
John Leyden, 29 Sep 2016

HP Ink COO: Sorry not sorry we bricked your otherwise totally fine printer cartridges

HP Inc is trying to spin its way out of the mess it created when it decided it would be a fantastic idea to brick unofficial and refilled printer cartridges. Jon Flaxman, COO of the printers'n'PCs chunk of the former Hewlett Packard, confirmed on Wednesday his company really did in fact issue a firmware update in March that …
Shaun Nichols, 28 Sep 2016
Auctioneer with hammer

Going, going, done: Trio of prolific auction fraud fraudsters jailed

Three men have been jailed yesterday over a conspiracy to commit internet shopping fraud scam that involved taking payments for non-existent goods and services. Calin Serbenescu, 28, a former labourer, was sentenced to five years' imprisonment; Ionut Cotavian Anitescu, 26, unemployed, was sent down for three years; while Dorel …
John Leyden, 20 Sep 2016
image by JoeBakal http://www.shutterstock.com/gallery-832894p1.html

Online scammers speed up: Hit gold every 15 seconds

There were over one million fraud attempts in the UK in the first six months of 2016, or one every 15 seconds - more than 50 per cent higher than the same period of last year. Between January and June 2016 there were 1,007,094 fraud cases in the UK compared to 660,308 in the first six months of 2015. Each case represents a …
John Oates, 20 Sep 2016
lg_rolly_keyboard_648

Amex phishing tackle

Brazen phishing fraudsters are using counterfeit versions of American Express’s own identity theft prevention scheme as a scam lure. SafeKey, Amex’s name for 3D Secure technology, adds an additional layer of security to online transactions and is designed to help prevent identity theft. Fraudsters have turned the purpose of …
John Leyden, 16 Sep 2016

US-CERT tells network operators to pay attention and harden up

The US-CERT is warning organisations to harden their networks, because resurgent malware plus the recent publication of powerful exploits proved too hot to ignore. The organisation says that threats like the a leak of Equation Group Adaptive Security Appliance (ASA) tooling are bad enough by themselves, but warns plenty of …
Darren Pauli, 09 Sep 2016

Sneaky Gugi banking trojan sidesteps Android OS security barricades

Updated Gugi, a bank-account-raiding trojan for smartphones, has been retooled to bypass Android 6's security features designed to block phishing attempts and ransomware infections. The modified malware forces users into giving it the ability to overlay genuine apps, send and view SMSes, make calls, and more. The software nasty is …
John Leyden, 06 Sep 2016

Thieves can wirelessly unlock up to 100 million Volkswagens, each at the press of a button

Security researchers will demonstrate how crooks can break into cars at will using wireless signals that can unlock millions of vulnerable vehicles. The eggheads, led by University of Birmingham computer scientist Flavio Garcia alongside colleagues from German engineering firm Kasper & Oswald, have managed to clone a VW Group …
John Leyden, 11 Aug 2016
Newly passed out 2Lts from 6 RIFLES on Salisbury Plain Training Area. Crown copyright, 2013

US military's fake chips battle

The US Department of Defense (DoD) has passed new rules designed to weed out the use of counterfeit hardware. Worried that fake gear such as chips or antenna parts could prove unreliable or pose a security risk (for example, be equipped with spyware by a foreign government), the DoD rules that government organizations and …
Shaun Nichols, 05 Aug 2016

Malaysia-based credit card fraud ring broken, 105 arrested

A total of 105 credit card fraud suspects have been arrested in Asia and Europe following a complex months-long investigation across two continents. The investigation targeted a gang led from Malaysia whose tentacles spread into 14 European countries (including the UK and Germany) and specialised in using counterfeit credit …
John Leyden, 08 Jul 2016
Lawyer up

Broker DP Data shuts up shop after HP's lawyers took a bite out of them

Grey broker DP Data Systems is facing a trademark infringement case brought by Hewlett Packard that ultimately convinced management to pull down the shutters, the business has claimed in its latest financial filing. As exclusively revealed by El Reg, the Manchester based wholesaler of HP, Cisco, IBM, Juniper and Lenovo shut up …
Paul Kunert, 30 Jun 2016

Objective-C can fly the COOP, says subversive at Microsoft Research

Objective-C programmers should use message authentication codes to protect sensitive objects and data structures, according to research presented to this week's Usenix Annual Technical Conference (ATC). A Microsoft Research staffer, and software researchers from UC Irving in America and folks in Germany focused on a technique …
Image by Dr Flash http://www.shutterstock.com/gallery-182053p1.html

Malaysians using South African cards pinch US$12.7m in Japan

Carders have made off with US$12.7 million (£8.7 million, A$17.5 million) ripping through 1400 ATMs in a mere two hours last week. The attackers netted ¥1.4 billion in cash from ATMs located in convenience stores across the country using counterfeit credit cards. Sources told local media the 1600 credit cards used in the …
Darren Pauli, 23 May 2016

First ATM malware is back and badder than ever

Cybercriminals have retrofitted a strain of ATM malware first discovered in 2009 to create an even more potent threat. Skimer was the first malicious program to target ATMs*. Seven years later, Russian cybercriminals are reusing the malware – but both the crooks and the program have evolved, to pose an even more potent threat …
John Leyden, 17 May 2016
Fat Tony

Google kneecaps payday loan ads

Google says it will no longer serve ads for short-term loan services it considers to be predatory lenders. The Chocolate Factory says that as of July 13, it will no longer be taking ads from loan services that seek repayment within 60 days or carry an annual percentage rate (APR) of 36 per cent interest or higher. The aim, …
Shaun Nichols, 11 May 2016

Prof squints at Google's mobile monopoly defence, shakes head

Analysis Google says that its tight control over Android is necessary to keep Android great, and safe for consumers, adding that it's not all that heavy-handed. Honest. Google feels hard done by because it has created a market of alternatives to Apple’s costly and proprietary iPhone, and that ecosystem benefits consumers. There’s no …
Andrew Orlowski, 20 Apr 2016
Prison

Chinese con-artists cop to US military counterfeit chip switch caper

Chinese national Daofu Zhang has pleaded guilty to conspiring to buy top-end field-programmable gate arrays (FPGAs) stolen from a US Navy base and replacing the swiped silicon with counterfeit duds. Last Friday, in Connecticut's New Haven federal court, Zhang, 40, admitted offering to purchase military-spec chips from a US …
hacker

What exactly is it that infosec miscreants get up to? A quick overview

If corporate IT infrastructures are a battlefield, then the cybercriminals are putting up a good fight. Last year saw some nasty breaches. Anthem Insurance, which lost nearly 80 million records, and the US Office of Personnel Management, which lost 21 million records after failing to encrypt its records. Cybercriminals are …
Danny Bradbury, 13 Apr 2016
google_vs_ms_648

Google ads probe blow

Google's attempt to shut down a probe by Mississippi Attorney General Jim Hood has been blocked by a US appeals court. Hood, along with other state prosecutors, wanted to investigate whether or not Google was complying with a $500m settlement with the US government. As well as coughing up the chunk of change, the web giant …
Chris Williams, 11 Apr 2016

Cyber-underworld price list revealed: $500 for company email inbox, $1,200 passports, etc

The underground bazaars for stolen online identities, access to corporate email inboxes, and fake ID are booming, we're told. Research by Dell SecureWorks says the market for underground hacking is increasing, particularly in Russia. Russian hackers are expanding their working hours and using guarantors to ensure customer …
John Leyden, 08 Apr 2016

Blighty starts pumping out 12-sided quids

The Royal Mint has begun pumping out the fetching 12-sided pound coins which will hit the UK's streets in March next year. The retro-styled nugget - which pays homage to the classic threepenny bit - is rolling off the production line at the rate of 4,000 a minute. It's heralded as "the world’s most secure coin in circulation …
Lester Haines, 01 Apr 2016

The Pirate Party finds a friend: A-G backs member against Sony

The Attorney General advising the European Court on a case that pits a Pirate Party member who operated a public, password-free Wi-Fi network in Munich, has sided with the Pirate. Professor Maciej Szpunar’s opinion isn’t the law, but is often influential in advising the Court’s ultimate decision. Sony discovered the Wi-Fi …
Andrew Orlowski, 16 Mar 2016

90% of SSL VPNs are ‘hopelessly insecure’, say researchers

Nine in 10 SSL VPNs use insecure or outdated encryption, putting corporate data at risk in the process, according to new research. High-Tech Bridge (HTB) conducted large-scale Internet research on live and publicly-accessible SSL VPN servers. The firm passively scanned 10,436 randomly selected publicly available SSL VPN …
John Leyden, 26 Feb 2016
Banned

BT, Sky, EE, TalkTalk and Virgin to appeal website blocking ruling

The Court of Appeal in London must maintain the right of brand owners to obtain website blocking orders against internet service providers as a means of enforcing their trade mark rights against infringers, an expert has said. The Court is expected to hear an appeal by BT, Sky, EE, TalkTalk and Virgin in April against a 2014 …
OUT-LAW.COM, 25 Feb 2016
Sidewalk mobile phone lane in China

FTDI boss hits out at 'Chinese criminal gang' pumping knock-off chips

FTDI's CEO Fred Dart has given a rare interview to explain that the company's sometimes-unpopular anti-counterfeiting practices are part of a fightback against a professional Chinese knock-off operation. Adafruit scored the chat, which is published here. Scotland-based FTDI ran into users' ire last year when people found its …
Counterfeit FTDI USB-to-serial adapter chips

Chip company FTDI accused of bricking counterfeits again

Semiconductor company Future Technology Devices International (FTDI), which in 2014 was caught out bricking products built using knock-off chips, has again been accused of fooling around with device drivers. Back in October 2014, the company shipped a device driver that checked the authenticity of USB chips claiming to be FTDI …

If you can't buy bootleg gear online in New York, this may be why

Usenix Enigma A university sleuth investigating online bootleggers has spoken of his research into counterfeit markets – including revealing the moment he accidentally blocked off a chunk of Manhattan to scammers. Understanding the money trail behind illicit internet businesses has been a passion of Damon McCoy, an assistant professor of …
Iain Thomson, 26 Jan 2016

That one weird trick fails: Google binned 780 million ads last year

Google blocked 780 million malicious and annoying advertisements last year, up from 256 million in 2014. The company says it has destroyed more than 10,000 sites foisting software like download wrappers, which install adware and the like. This, it says, reduced the total unwanted downloads through Google ads by 99 percent. …
Darren Pauli, 22 Jan 2016

Brazilian whacks: as economy tanks, cyber-crooks samba

Brazil's economy may be hurtling towards recession but its online criminal underground is booming with wannabe hackers and carders racing to get a cut, research finds. Trend Micro's work is the latest in a series of papers it has published in recent months that examine regional online crime economies including North America, …
Darren Pauli, 13 Jan 2016

50c buys you someone else's password for Netflix, Spotify or ...

Criminals are selling 'lifetime' Netflix, HBO, and cable sports streaming accounts for less than US$10 on sites hidden within Tor. Premium sports accounts sell for about $10 while streaming TV can be bought for as low as 50 cents, far less than the $10 monthly subscription. Comic fans can buy a stolen Marvel Unlimited …
Darren Pauli, 02 Dec 2015
'Broken Copyright' StockMonkeys.com

Team America, world police, take down 37,479 counterfeit sites

A band of merry world police lead by the United States Customs and Border Protection service shut down 37,479 copyright-infringing websites hawking counterfeit goods in the lead up to the Cyber Monday buying blitz. The takedown involved varying forms of collaboration between 27 countries including the Britain, France, Denmark …
Darren Pauli, 01 Dec 2015

So why exactly are IT investors so utterly clueless?

Something for the Weekend, Sir? Are you thick or what? No, really, how else can you explain why you invest vast sums of money on daft schemes that nobody wants? Long-time readers of this column may remember my little Tech City adventure a while back, in which I managed 2,000 sq ft of chic hipster office floorspace in the heart of London’s so-called "silicon …
Alistair Dabbs, 27 Nov 2015

UK/China cyber security deal: National security attacks still OK, it seems

Contrary to several trigger-happy reports, China's president Xi Jinping has not signed a formal agreement with the UK prime minister David Cameron on cyber security. Rather, the nations have issued a joint statement – which UK government spokespersons did not want to tell The Register was legally binding – which mentions an …

Of course you can text and call while driving – it's perfectly safe

We are often lectured not to talk or text while driving, yet increasingly, our cars are doing it all the time. The connected car is finally here, and it is the ultimate distracted driver. While getting you from A to B, it is also monitoring its own tyre pressure and adjusting its suspension accordingly. It is ready to call the …
Robin Birtstone, 21 Oct 2015

XcodeGhost attack tapped into dev distaste for Apple's Gatekeeper

In light of XcodeGhost, the number of malware-laden iOS apps is focusing attention on how developers were tricked into using dodgy code in the first place. The Xcode development tools used by iOS app makers were copied, modified and distributed online before (mainly) Chinese developers used the counterfeit code to compile apps …
John Leyden, 23 Sep 2015

Apple cleans up iOS App Store after first big malware attack

Apple is cleaning up its official iOS App Store after the first large-scale attack on its walled garden mobile software site. The Xcode development tools used by iOS app makers was copied, modified, and distributed online, by hackers to inject malicious code into apps available on the App Store, as previously reported. Palo …
John Leyden, 21 Sep 2015
A garden gnome depicted stretched out across picnic table... with a pipe in one hand while the other props him up. Has a confrontational look in his eye...

Pirate MEP: Microsoft's walled garden is no consumer pleasure park

Microsoft is trying to create its own “walled garden”, much to the detriment of consumers, Pirate Party MEP Julia Reda has told El Reg. Reda was referring to the new unified Microsoft services policy, which came into force at the beginning of this month and covers almost all of the tech goliath’s consumer services. In it, …
Jennifer Baker, 19 Aug 2015
Osborne 1, second version - DRAM detail

Is that a graphics driver on your shop's register – or a RAM-slurping bank card thief?

Crooks are infecting sales registers running Oracle-owned MICROS software with malware tailor-fitted to steal bank card information from the machines. MalumPoS scrapes sensitive data from the RAM inside the tills, which are used in places from shops and restaurants to hotels and bars. The software nasty can be easily modified to …
John Leyden, 09 Jun 2015

Fake Cisco box pushers cuffed by Intellectual Property Police

A London-based criminal outfit suspected of flogging $10m (£6.6m) in counterfeit Cisco networking gear to the US has been arrested by the City of London Police Intellectual Property Crime Unit (PIPCU). Three men aged 38, 36 and 35, were arrested last week by City police on suspicion of running the counterfeit business. An …
Kat Hall, 07 May 2015

Intellectual property laws in China, India are flawed, claims US govt without irony

The US government is looking to shame China and India for their lax attitudes toward intellectual property law enforcement. The office of US Trade Representative Ambassador Michael Froman said in its annual Special 301 report [PDF] that the two Asian nations were among the worst at snuffing out counterfeit goods. The two …
Shaun Nichols, 02 May 2015

Google Password Alert could be foiled with just 7 lines of JavaScript

Google has been obliged to revise its Password Alert anti-phishing protection just hours after releasing it when security researchers showed how the technology was easily circumvented. Security consultant Paul Moore (@Paul_Reviews) has published a proof-of-concept JavaScript exploit that skirted the defensive technology with …
John Leyden, 01 May 2015
Man in an orange jumpsuit clutches prison bars. Image by Shutterstock

Bloke, 22, in knockoff Microsoft Xbox ring gets 18 months in the cooler

A 22-year-old member of a games-hacking ring that sold counterfeit Microsoft's Xbox One consoles could spend the next year and a half behind bars in America. A US court sentenced Canadian David Pokora to 18 months in the slammer for his involvement in a group accused of stealing an estimated $100m to 200m worth of source code …
Shaun Nichols, 24 Apr 2015
Samsung Galaxy S5

Got a Samsung Galaxy S5? Crooks can steal your fingerprint – claim

RSA 2015 Malware can snaffle fingerprints used to unlock Samsung Galaxy S5 smartphones thanks to a security blunder, researchers claim. The vulnerabilities, due to be discussed at the RSA security conference in San Francisco this week, may be present in non-Samsung Android mobiles, too. Today's smartphones recognize their owners' …
John Leyden, 23 Apr 2015