Articles about Counterfeit

alibaba logo

Alibaba's magic cave empties as it misses revenue target

Chinese online tat bazaar Alibaba has not only posted disappointing results, been caned by the stock market but now has also fallen foul of China's government for knowingly hosting sellers of counterfeit kit. The company reported that it earned $964m for the last quarter of 2014 on revenue of $4.22bn. The earnings number was …
Simon Sharwood, 30 Jan 2015
BUS SPOTTERS SPOT BLUESTAR

Islamic script kiddies aim killer blow - at Bristol bus timetable website

Bristol residents looking for bus and train timetables were confronted by a message from Islamic militants following a defacement of the TravelWest website. A self-styled "Arab Security Team" called Darkshadow sprayed digital graffiti on Bristol-based travel information website www.travelwest.info. Local reports speculate that …
John Leyden, 02 Jan 2015

The Reg's review of 2014: Naked JLaw selfies, Uber and monkey madness

Facebook buying WhatsApp for nearly as much as Hewlett-Packard spent on Compaq in 2001? Well, 2014 was the year of the selfie, after all. Just don't let that snapshot of your bits get hacked. Leaked naked smartphone pics weren't this year's only embarrassing public spectacles: Microsoft's CEO put his foot in his mouth on women …
Gavin Clarke, 28 Dec 2014
Fraud image

Webcam-snooping spawn of ZeuS hits 150 banks worldwide

The latest evolution of the online bank account raiding Trojan ZeuS is the webcam-spying Chthonic malware, according to researchers. Chthonic infects Windows PCs, and allows criminals to connect to the compromised PC remotely and command it to carry out fraudulent transactions. The software nasty is targeting customers of …
John Leyden, 19 Dec 2014

Roll up, come see the BOOMING HACKER BAZAAR!

Underground hacker markets are booming with counterfeit documents, premiere credit cards, hacker tutorials, and "complete satisfaction guarantees", according to a new report from Dell SecureWorks. The means to create a false identity are easily purchased through the cracker bazaars. A fake social security card can be obtain …
John Leyden, 15 Dec 2014
Brute force

Home Wi-Fi security's just as good as '90s PC security! Wait, what?

UK home Wi-Fi security is as bad as PC security was in the 1990s, according to a new study. Security software firm Avast found that more than half of all routers are poorly protected by default or common, easily hacked password/ID combinations. Easily hacked password combinations such as admin/admin or admin/password, or even …
John Leyden, 08 Dec 2014
Cartoon of  green skeletal figure reaching out of phone

DeathRing: Cheapo Androids pre-pwned with mobile malware

A new mobile Trojan is being pre-loaded onto smartphones somewhere in the supply chain. DeathRing masquerades as a ringtone app and is impossible to remove because it’s pre-installed in the system directory, according to mobile security firm Lookout. Samples of the malware are restricted to entry-level phones purchased in Asian …
John Leyden, 04 Dec 2014
Pirate Flag

Knockoff knockdown: Euro cops shutter 300 'counterfeit' domains

Nearly 300 domain names flogging illegal merch have been seized by Europol as part of a global crackdown on sites selling counterfeit goods before Christmas. Europol and US Immigration and Customs Enforcement (ICE) Homeland Security Investigations (HSI), together with 25 law enforcement agencies from 19 countries, seized 292 …
Kat Hall, 02 Dec 2014

Home Depot hacker hosing cost a wallet-draining $43m (so far)

Hacked hardware mart Home Depot has forked out $43m to quash spot fires emanating from the data breach inferno this year, SEC filing documents show. The payout covered damages from the theft of 56 million payment cards and 53 million email addresses. It covered the cost of investigating this year's five-month-long breach, …
Darren Pauli, 27 Nov 2014
iPhone shop Shenzhen

ITU thought bubble ponders mass mobe-tracking to kill fake IT

The International Telecommunications Union (ITU) will next week meet to consider the issue of “counterfeit and substandard ICT products” and what can be done about them, but some of the proposals on the table look more than a little worrying. Notice of the meeting was posted in late September, when the ITU announced next week' …
Simon Sharwood, 13 Nov 2014

Crooks are using proxy servers to build more convincing phishing sites – new claim

Crooks using phishing pages to grab victims' passwords have apparently upped their game – by using proxy servers rather than static pages to craft legit-looking websites. Normally, thieves recreate a web page – such as a login page for an online shop or webmail – and stick it on a compromised server, then direct marks towards …
John Leyden, 07 Nov 2014

Security products: Best of breed or create your own monster?

IT security is not just about antivirus or firewall products anymore. There is a whole layer cake of different product types designed to protect your organisation in different ways. It is a stack, in much the same way as TCP-IP networking or web server functionality has stacks of functionality. The question is, what's the best …
Danny Bradbury, 07 Nov 2014

Crypto collision used to hijack Windows Update goes mainstream

The cryptographic hash collision attack used by cyberspies to subvert Microsoft's Windows Update has gone mainstream, revealing that MD5 is hopelessly broken. Security researcher Nat McHugh created two images of different rock 'n' roll icons - James Brown and Barry White - with the same MD5 hash. "The images were just two I …
John Leyden, 05 Nov 2014
Pirate Flag

Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?

The Motion Picture Ass. of America (MPAA) is once again looking to rat out known piracy hotbeds to the US government, both online and in real life – and Canada's largest urban center remains high on its list. The MPAA said on Monday that it had provided the office of the US Trade Representative (USTR) with a list of markets …
Shaun Nichols, 29 Oct 2014

FBI impersonated newspaper to finger school bomb threat suspect

A US newspaper has reacted angrily after it emerged that the FBI impersonated its website in order to locate a target using snoopware. The Feds set up a fake Seattle Times news story on a counterfeit website in order to entice a bomb-threat suspect to disclose his location back in 2007. Links to the doctored story were sent to …
John Leyden, 28 Oct 2014
Counterfeit FTDI USB-to-serial adapter chips

FTDI yanks chip-bricking driver from Windows Update, vows to fight on

Chipmaker FTDI has pulled a driver from Windows Update that could brick devices containing knockoff versions of its USB-to-serial bridge chips, but says it won't back down on its aggressive anti-counterfeiting stance. Earlier this week, hackers from various hardware forums began noticing that FTDI's latest driver would set a …
Neil McAllister, 24 Oct 2014
iMessage

iMessage SPAM floods US mobile networks

China-based counterfeiters are spamvertising knock-off designer goods using Apple iMessage instead of using conventional email spam runs. iMessage has been hit with the single largest US mobile spam campaign this year. The campaign, which has been going on for months, was large enough to account for more than 80 per cent of all …
John Leyden, 24 Oct 2014
The concrete blocks available for our rocket motor testing

Chipmaker FTDI bricking counterfeit kit

Reports are emerging that chip-maker FTDI has declared war on chip counterfeiters with a driver update that bricks USB devices recognised as fakes. Hackaday reports that the issue has been noticed in various forums – EEVBlog and Arduino among them – and pins the issue down to drivers setting the USB product ID to 0 if a USB …
Crime in Russia

Hacker-hunters finger 'Keyser Soze' of Russian underground card sales

A hacker based in Odessa, Ukraine has become the main provider of data stolen from compromised credit cards, a new study claims. According to Russian cyber-security consultancy Group-IB, a person or persons operating under the pseudonym “Rescator” (AKA Helkern and ikaikki) uploaded details of over five million cards onto the …
John Leyden, 16 Oct 2014
Cartoon of  green skeletal figure reaching out of phone

Will we ever can the spam monster?

Spam may be the best known security threat in the world. Anyone with email or a Facebook account has experienced it, despite providers’ best efforts to block it from their inboxes. And although the world’s cyber warriors have taken down large chunks of infrastructure hosting massive spam campaigns, it remains a huge problem. As …
Tom Brewster, 06 Oct 2014
management regulation2

Harper review says ACCC telco functions need new regulator

The federal government is considering a competition review that suggests ditching the current telco competition regulator in favour of a new body. Key to the telecommunications reforms is the ACCC's more general role in regulating access to monopoly infrastructure, which also covers rail, ports and the like. In the …
Clay in ZipLoc bag masquerading as an iPad 2

5 Nigerian gangs dominate Craigslist buyer scams

Just five Nigerian criminal gangs are behind a widespread type of fraud targeting sellers on Craigslist. The Lads from Lagos are going to considerable lengths of investing time and money in order to make their scams more plausible, according to a study by George Mason University researchers Damon McCoy and Jackie Jones. The …
John Leyden, 11 Sep 2014

Cops BUST RING, CUFF BLOKES in Skegness RAID

Microsoft and Adobe can rest easily in their beds tonight after the quack crack squad at the Police Intellectual Property Crime Unit nabbed two men flogging dodgy software from their secret lair in Skegness. Specialist fuzz from the City of London Police Intellectual Property Crime Unit (PIPCU) along with detectives from the …
Paul Kunert, 03 Sep 2014

Govt waves stick at pirate-friendly Google search

Culture Secretary Sajid Javid has threatened to introduce legislation if Google doesn’t stop promoting pirate sites above legitimate sites in its organic search results. “Search engines also have to play their part. They must step up and show willing,” Sajid Javid told the BPI at their AGM yesterday. “That’s why Vince Cable …
Andrew Orlowski, 02 Sep 2014

TV transport tech, part 1: From server to sofa at the touch of a button

Feature Ah, the magic of television. With the press of a button and the twist of a knob, the residents of homes around the country could cosy up for an evening's entertainment as the set warmed up to a steady monochrome glow – with the lucky ones able to tune in to BBC 2. Virgin Media Digital Media Centre Virgin Media Digital Media …
Bob Dormon, 18 Aug 2014
bug

Secluded HijackRAT: Monster mobile malware multitool from HELL

Cybercrooks have brewed up a malicious Android app that bundles a raft of banking fraud tricks into a single strain of mobile malware. The Secluded HijackRAT is banking trojan that packs together new and previously unseen tricks, according to net security firm FireEye. The mobile nasty combines private data theft, banking …
John Leyden, 03 Jul 2014
Pigeon crapping on statue

Amazon reseller lobs sueball at etailer and Apple over listings yank

An Amazon electronics reseller has filed a lawsuit against the mega-etailer alleging that the firm "conspired" with Apple to put it out of business because it was selling iPad covers at a cheap price. Hard 2 Find Accessories (H2F) claims that Amazon revoked its seller’s privileges, effectively closing its operations down, …
Dogecoin

Bitcoin was illegal in California? Whoops, governor fixes that 165-year-old money law

California Governor Jerry Brown has signed off on a law legitimizing Bitcoin and other cryptocurrencies for use in the state. The governor rubber-stamped AB 129, enacting what legislators say is a much-needed overhaul of the state codes on currencies. Under the new law, digital currencies and community currencies are …
Shaun Nichols, 01 Jul 2014

Tor is '90 per cent of the net' claims City of London Police Commish – and he's dead wrong

Yet again, someone who should know better appears to be hyping up the size of the so-called “darkweb” to push an agenda. As reported by TorrentFreak, the remarks were made to the IP Enforcement Summit in London. According to that report, among other things, Commissioner Adrian Leppard of City of London Police said: “Whether it’ …
A fake iPhone with electric shock capabilities

Shocking 'new iPhone' is also - BZZZZT!! - a Taser-like stun gun

Australia's Customs and Border Protection Service has seized counterfeit iPhones that can't make calls but can impart a nasty electrical shock if pressed against the skin. The agency showed off the shocking fakes yesterday, after arresting a chap who had imported them along with knuckle-dusters, electric shock devices …
Simon Sharwood, 02 May 2014

China's customs cops grab 76 MEEELLION tech products

Chinese customs cops claim to have confiscated a whopping 76 million items thought to have broken copyright laws last year, many of them electronics, highlighting the persistent problems associated with IPR in the Middle Kingdom. Some 98 per cent of the goods – accounted for in 20,464 batches – violated trademark rights, the …
Phil Muncaster, 29 Apr 2014
Counterfeit iPhone shop, Shenzhen, China

Cross-border kids used as Easter iPhone MULES in China

Cross-border school kids as young as 10-years-old are being used as mules to smuggle iPhones and other electronic gadgetry from Hong Kong into China where they can be sold at a premium. Customs officers found five cases of electronic devices inside students’ backpacks during the Easter holidays on Saturday, according to Hong …
Phil Muncaster, 24 Apr 2014

Never mind the HORSE MEAT, trading standards cuts'll hurt IT crowd, too

The Federation against Software Theft (FAST) and the Trading Standards Institute (TSI) have said they're very concerned about standards budgets in England and Wales being slashed by an average of 40 per cent. While TSI is worried about the next horse-meat scandal or children being harmed by counterfeit toys if trading …
Pirate Flag

Feds land first convictions over pirated mobile apps

The US has enforced its first convictions for illegally distributing counterfeit mobile apps, after two Florida men pleaded guilty for their part in a scheme that sold pirated apps with a total retail value of more than $700,000. Thomas Allen Dye, 21, and 26-year-old Nicholas Anthony Narbone both pleaded guilty to the same …

QUIDOCALYPSE: Blighty braces for £100 MILLION cost of new £1 coin

As we predicted yesterday, it hasn't taken coin-guzzling machine operators long to kick off moaning about the cost of converting kit to accept Blighty's new 12-sided quid*, slated to hits the streets in 2017. The proposed 12-sided pound coin. Pic: The Royal Mint We suggested the retrofit bill for the old thrupenny-inspired …
Lester Haines, 20 Mar 2014

Blighty goes retro with 12-sided pound coin

In agreeable news for those readers who can remember when it was all trees round here and you could get an enormous paper bagful of gobstoppers for thruppence, The Royal Mint has unveiled a decidedly retro 12-sided design for Blighty's £1 coin. The proposed 12-sided pound coin. Pic: The Royal Mint The mint reckons that a …
Lester Haines, 19 Mar 2014
A boat full of Fail

Phisherman's friend: Confused hacktivists deface FAKE BANK SITE

Anon hackers have been caught boasting about defacing a counterfeit Yorkshire Bank website. Hacktivist crew Anon Ghost earned coverage on underground security blogs for defacing “Yorkshire Bank, one of the largest United Kingdom bank (sic)”. However, the hackers actually hit "ybs-bank.com", a Malaysian imitation of the real …
John Leyden, 06 Mar 2014
DARPA Synapse chip

DARPA wants help to counter counterfeits

DARPA is seeking vendor input into a program designed to defeat the problem of counterfeit electronic components. As the agency states in its announcement, the provenance of electronics components is a big deal in the military, since a component failure can endanger (for example) a fighter jet's mission (as well as the …
Mobile phone stolen by pickpocket

Thought mobe banking apps were safe from nasties? THINK AGAIN

Fake SSL certificates in the wild for Facebook, Google and Apple's iTunes store create a grave risk of fraud for people who bank online using their smartphones. Analysis outfit Netcraft said it has found "dozens” of fake SSL certificates impersonating banks, ecommerce sites, ISPs and social networks. The counterfeit credentials …
John Leyden, 14 Feb 2014

Flappy Bird's ANIMATED CORPSE may spread malware PLAGUE

Cybercrooks have been quick to latch onto the hype about Flappy Bird's demise by laying a variety of malware-based traps. Counterfeit Flappy Bird Android apps packing malware have been spotted all over the web, with sightings by both Trend Micro and Sophos, among others. Trend warns that counterfeit copies of the mobile game …
John Leyden, 12 Feb 2014

Security 101 fail: 3G/4G modems expose control panels to hackers

Vulnerabilities in a number of 3G and 4G USB modems can be exploited to steal login credentials – or rack up victims' mobile bills by sending text messages to premium-rate numbers – a security researcher warns. Andreas Lindh claims that all the devices he has looked at so far are managed via their built-in web servers and – you …
John Leyden, 30 Jan 2014
FBI badge and gun

Got a TorMail account to avoid Uncle Sam's web snoops? About that...

It appears the US Federal Bureau of Investigations (FBI) has a copy of a server used by TorMail – a hidden email service that tries to keep its users anonymous. In a court filing [PDF] that emerged this week, it's said FBI agents obtained the contents of a TorMail server last summer. According to the statement, submitted by a US …
Shaun Nichols, 28 Jan 2014

Feds indict four over alleged Android app copyright infringement

The US Department of Justice has taken a break from handing Amazon an ebook monopoly and instead indicted four operators of Android warez sites. The four charged with criminal copyright infringement operated the sites Snappzmarket and Appbucket, whose domains were seized by the FBI in August 2012. Authorities allege that the …
Andrew Orlowski, 27 Jan 2014

China cuffs 60,000 pirates in 2013 crackdown

Police in China arrested just shy of 60,000 people suspected of copyright abuses last year, in cases worth 173 billion yuan (£17bn). A total of 59,222 perps involved in 55,180 cases were cuffed in 2013, according to Ministry of Public Security stats revealed by state-run newswire Xinhua. Some 1,260 criminal networks were …
Phil Muncaster, 24 Jan 2014
Printed key

French gov used fake Google certificate to read its workers' traffic

A French government agency has been caught signing SSL certificates and impersonating Google. The bogus certificates were endorsed by the certificate authority of the French Treasury, DG Trésor. And the Treasury's own authorisation certificate was, in turn, vouched for by IGC/A (Infrastructure de Gestion de la Confiance de l' …
John Leyden, 10 Dec 2013

Customs cops shutter 700+ domains in global anti-piracy blitz

Customs officers and cops across the globe have teamed up to take down over 700 domains selling pirated goods over the busy Thanksgiving holiday sales weekend. The US Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI) team joined forces with Europol and Hong Kong Customs to seize top level domains …
Phil Muncaster, 05 Dec 2013

City of London cops ARREST 6 suspected to be MICROSOFT COUNTERFEIT RING

The cops have cuffed six people from Barton-upon-Humber and the surrounding area on suspicion of flogging counterfeit Microsoft gear online, the City of London (CoL) police has confirmed. The arrests which took place last Thursday (21 November) were all part of the national Police Intellectual Property Crime Unit investigation …
Paul Kunert, 26 Nov 2013
chain_relationship_channel

Feel Cisco's WRATH: Over 1,000 placed on DENIED partner sh*t list

Exclusive Cisco has launched an EMEA-wide crackdown in the channel after expelling Phoenix IT Group from the Gold Partner network, which our sources alleged was because it flouted support rules by supplying grey market kit. The Brand Protection police at the networking Goliath sent letters to more than 1,000 resellers, integrators and …
Paul Kunert, 08 Nov 2013
cloud

Truly secure clouds? Possible but not likely say Georgia Tech boffins

Georgia Tech has added itself to the chorus, nay, throng of voices warning that poorly-implemented cloud computing and the world of BYO mobile devices are threats to enterprise security. In its Emerging Cyber Threats 2014 report, GT's Information Security Center joins World+Dog in noting that the Snowden NSA whistle-blowing has …
Admiral Ackbar

Drugs e-souk Silk Road back from the dead with new Dread Pirate Roberts

Barely a month after the FBI shuttered the first Silk Road online black market, the secretive souk is back with another "Dread Pirate Roberts" (DPR) at the helm – and the operator has added PGP encryption for good measure. "Over the last four weeks, we have implemented a complete security overhaul. This overhaul marks the dawn …
Iain Thomson, 07 Nov 2013