Articles about Cybercrime

The Register breaking news

Alleged Muscovite cybercrime daddy hauled in to face US court

A suspected Russian cyber-crook has arrived in the US to face charges of security fraud, computer hacking and ID theft following his deportation from Switzerland. Vladimir Zdorovenin, 54, of Moscow, Russia, is alleged to have masterminded a series of credit card theft and stock manipulation scams in conjunction with his son, …
John Leyden, 18 Jan 2012
The Register breaking news

Bank insiders charged in ZeuS cybercrime smackdown

Six corrupt bank insiders turned ZeuS money mule suspects have been arrested in Moldova. All half dozen of the suspects worked in local banks in the east European country. Investigators reckon the suspects specialised in laundering Western Union and MoneyGram payments received from co-conspirators in the West that can ultimately …
John Leyden, 08 Nov 2010
Headshot of Trojan horse

Vawtrak challenges almighty ZeuS as king of the botnets

Crooks behind Vawtrak, a dangerous banking Trojan, are ramping up its reach and sophistication, security firms have warned. Vawtrak currently ranks as the single most dangerous threat, according to PhishLabs. Only Zeus and its many variants (GameOver, KINS, ZeusVM, Zberp, etc.) taken as a single malware "family" would outrank …
John Leyden, 27 Dec 2014
Sad Anonymous

Anonymous loose cannon admits DDoSing social services and housing websites

A middle-aged Briton has admitted running a series of debilitating denial of service attacks against social services, social housing and crime prevention websites. Ian Sullivan, 51, of Bootle, Merseyside, also admitted responsibility for a series of Distributed Denial of Service (DDoS) attacks against private sector firms, …
John Leyden, 10 Feb 2015
Man in an orange jumpsuit clutches prison bars. Image by Shutterstock

Cuffing darknet-dwelling cyberscum is tricky. We'll 'disrupt' crims instead, warns top cop

Europe's top cyber-cop has called for a shift in focus from the prosecution of online crims to the disruption of their activities. This comes as crooks increasingly make use of the darknet – private peer-to-peer networks such as Tor – to stay hidden and anonymous; cops find it difficult to work out suspects' true identities and …
John Leyden, 29 Apr 2014

Carders punch holes through Staples

US office giant Staples is investigating a possible credit and debit card breach of its Northeastern stores. Evidence for the hack, reported by cybercrime and prolific breach blower Brian Krebs, is apparently based on a dozen fraud monitor sources within different US banks. Staples has contacted police and said it was …
Darren Pauli, 21 Oct 2014

Two in five Brits cough up for CryptoLocker ransomware's demands

Around two in five people who fall victim to CryptoLocker have agreed to pay a ransom of around £300 to recover their files, according to a survey of victims. Researchers from the University of Kent quizzed a total of 48 people who had been affected by CryptoLocker. Of the sample, 17 said they paid the ransom and 31 said they …
John Leyden, 28 Feb 2014

It's 2015 and ATMs don't know when a daughterboard is breaking them

Carders have jackpotted an ATM by inserting a circuit board into the USB ports of an ATM, tricking it into spitting out cash. The technique was thought to have emulated the cash dispenser of the ATM so the brains of the machine thought everything was normal, buying additional time for the brazen crooks to make off with the cash …
Darren Pauli, 07 Jan 2015
The Register breaking news

UK.gov revamps cybercrime strategy

The government has announced a modest revamp of its strategy for fighting cybercrime. In a low-key statement to the House of Commons on Tuesday, junior Home Office minister Alan Campbell said the strategy aimed to build confidence in the provision of (government and private sector) services via the internet, tackle financial …
John Leyden, 31 Mar 2010
apple mac malware vxer

Three WireLurker suspects arrested in China – reports

Three people suspected of involvement in the WireLurker malware campaign have been arrested in China, according to reports. The suspects – whom the Beijing Public Security "internet" unit named only as Chen, Lee and Wang – were apparently arrested in the Beijing area following an investigation assisted by local security firm …
John Leyden, 17 Nov 2014
Wifi grumpy cat

Japan's death threat hacker collared ... BY A CAT

A Japanese hacker who hijacked computers using malware before issuing death threats through the compromised machines has been jailed for eight years. Yusuke Katayama, 32, threatened to blow up planes and attack a kindergarten attended by the grandchildren of Japan's Emperor Akihito before he was finally nabbed in February 2013 …
John Leyden, 05 Feb 2015

Elderly zombie Asprox botnet STILL mauling biz bods, says survey

The Asprox botnet was responsible for about 80 per cent of all attack sessions recorded during October 2014, impacting nearly 2,000 different organisations. These figures, from a new report by Palo Alto Networks, provide evidence that the Asprox (AKA Kuluoz) malware family is continuing to plague businesses, despite multiple …
John Leyden, 11 Dec 2014
blackmail

Hackers seize Detroit's database, demand $800k. Motor City shrugs: OK, take it

Hackers seized a database from the City of Detroit earlier this year before unsuccessfully demanding $800,000 in Bitcoin. The failed extortion attempt back in April was disclosed by Detroit mayor Mike Duggan at the North American International Cyber Summit conference on Monday. The stolen database wasn’t needed by the cash- …
John Leyden, 20 Nov 2014

Hilton member accounts info, trip dates open to plunder

A pair of security researchers have found a basic flaw that allows anyone to steal email and home address information, trip data, and spend points of Hilton Worldwide "HHonors" loyalty club members. The cross-site request forgery is tied to a password reset initiative the company launched offering 1000 points to those who took …
Darren Pauli, 24 Mar 2015
Kronos

'Father of Zeus' banking trojan appears at very reasonable price

A banking trojan dubbed the father of the infamous Zeus malware is being flogged on cybercrime marketplaces for a pricey $7000, says fraud specialist Etay Maor. The Kronos malware was sold on a cybercrime forum, pitched particularly to Zeus trojan customers given its capabilities to re-use that trojan's form grabbing templates …
Darren Pauli, 15 Jul 2014
Blackmail image

Cyber scum pump ransomware at victims from spambot-stuffed websites

Miscreants have brewed up a strain of ransomware which functions like the recently dead CryptoLocker - and this one communicates using the Tor browsing anonymization network. Critroni appears geared towards exploiting a gap in the market created by a takedown operation against the CryptoLocker and Gameover ZeuS botnets back in …
John Leyden, 22 Jul 2014

Russian botnet suspects cuffed over romantic MMS spyware allegs

Russian cops have arrested two mobile botnet cybercrime suspects as part of an ongoing investigation that's reckoned to be the first of its kind in Russia. The unnamed duo, aged 25 and 24 and both resident in Arkhangelsk (a city in the north of European Russia) were arrested as part of an investigation into attempts to defraud …
John Leyden, 19 Sep 2014
The Register breaking news

Senate bill seeks crack down on cybercrime havens

Foreign countries that turn a blind eye to cybercrime would lose US financial assistance and resources under a bill introduced Tuesday in the Senate. The International Cybercrime Reporting and Cooperation Act would require the President to identify "countries of cyber concern" and to plot a course to help each one get tougher …
Dan Goodin, 23 Mar 2010

Flash zero day under attack

A zero day Flash vulnerability is being actively exploited by criminals using the popular Angler exploit kit. Adobe is investigating the report by respected French malware researcher Kafeine, who found the exploit kit circulating on cybercrime forums. The vulnerabilities affected Flash Player versions up to 15.0.0.223 and the …
Darren Pauli, 22 Jan 2015
chalk outline of  human body at crime scene

Botnet masters using Tor to hide control tools for ZOMBIE SLAVES

The Tor anonymisation network is being used to hide 900 botnet and cybercrime-related hidden services, according to Kaspersky Lab. Kaspersky security researchers report that the Tor network is playing host to the ChewBacca point-of-sale keylogger and the ZeuS banking malware control infrastructure, as well as the first Tor …
John Leyden, 06 Mar 2014
The Register breaking news

Plug pulled Latvian cybercrime hub

Upstream providers have pulled the plug on Latvian ISP Real Host over allegations it maintained cybercrime servers linked to the Zeus botnet. Real Host was disconnected by its upstream provider, Junik, on Monday, after TeliaSonera told Junik to either cut the juice or face sanctions itself, according to reports by the FT and …
John Leyden, 05 Aug 2009
Hacker baseball cap

Hackers use DRAFT emails as dead-drops for running malware

Sneaky hackers are using Gmail and Yahoo! drafts to control compromised devices, with the tactic designed to make detection of malware-related communications more difficult to pick up in enterprise environments. Attacks occur in two phases. Hackers first infect a targeted machine via simple malware that installs Python onto the …
John Leyden, 06 Nov 2014
The Register breaking news

Cybercrime police's budget slashed by 30%

Exclusive The national police unit responsible for fighting cybercrime faces a deep cut to its already stretched budget, counter to pre-election talk of an increased focus on the UK's digital security. According to senior Westminster sources, the coalition government has quietly and drastically trimmed the £3.5m that the Police Central …
Spying image

Securobods claim Middle East govts' fingerprints all over malware flung at journos

Researchers at Toronto-based Citizen Lab have shot down denials by Syria, Bahrain and the United Arab Emirates regarding attacks against activists, journalists and dissidents, labelling some of the assaults as incompetent. The team gathered tens of thousands of documents and files detailing the malware and social engineering …
Darren Pauli, 31 Jul 2014

Most convincing PHISHING pages hoodwink nearly half of you – Google

Nearly half (45 per cent) of those who visit the most convincing phishing pages are tricked into handing over personal information, according to Google. This effectiveness drops to just three per cent in the case of the most obviously scummy phishing sites, while the online giant reports that the account hijackers work quickly, …
John Leyden, 11 Nov 2014
homeless man with sign

Met chief fears Brit cybercrime gangs

Britain's most senior police officer has raised fears that home-grown organised gangs are waking up to the low risks and high rewards of cybercrime. Sir Paul Stephenson, Commissioner of the Metropolitan Police, issued the warning in a Sunday newspaper article highlighting the importance of specialist officers. Debate around …

Citadel Trojan snooped on password managers to snatch victims' logins

Crooks have unsheathed a variant of the Citadel Trojan that targets password managers. The malware is designed to steal a victim's master passphrase, thus unlocking his or her database of website passwords in the process. The software nasty runs a key-logger to intercept what people type into the Password Safe and KeePass open- …
John Leyden, 21 Nov 2014
The Register breaking news

Police confirm cybercrime budget cut

The Metropolitan Police have confirmed their budget for battling cybercrime nationally has been slashed by the Home Office. The Register revealed on Friday that central government funding for the Police Central eCrime Unit (PCeU) had been quietly cut by 30 per cent. A spokeswoman for the Met said the PCeU had been targeted as …
PCS with a red X in front of them

ATTACK of the Windows ZOMBIES on point-of-sale terminals

Security watchers have spotted a fresh Windows-based botnet that attempts to hack into point-of-sale systems. Cyber threat intelligence firm IntelCrawler reports that the “@-Brt” project surfaced in May through underground cybercrime forums. The malware can be used to brute-force point-of-sale systems and associated networks, …
John Leyden, 09 Jul 2014
The Register breaking news

EU mulls new central cybercrime agency

The European Commission will investigate the establishment of a new EU agency to tackle cybercrime. The new agency could be part of Europol, EU ministers have said. The Council of Ministers has asked the Commission to look at its agreed set of cybercrime objectives and investigate whether a new, centralised agency is a better …
OUT-LAW.COM, 29 Apr 2010

Google dodges 'costly' legal precedent, settles Daniel Hegglin case

Google has avoided a costly legal precedent by settling out of court in an online abuse case due to be heard in the High Court today, legal experts have said. Daniel Hegglin was seeking an injunction to force Google to block all traces in its search results of online abuse against him, following a defamatory anonymous campaign …
Kat Hall, 24 Nov 2014
pyramidinvestnorthafrica

The ULTIMATE CRUELTY: Sandworm uses PowerPoint against Swiss bank customers

The Sandworm vulnerability is being actively abused to attack Swiss banking customers, Danish security consultancy CSIS has warned. CSIS reports that the attacks are pushing the latest version of the Dyre banking trojan. Attacks arrive as spam emails under the guise of information about unpaid invoices. In reality the …
John Leyden, 30 Oct 2014

Miscreants leak banking baddie's secret source

Miscreants have released the source code for the Tinba banking Trojan in a move that may spawn the development of copycats. The secret source behind early versions of the small (some versions weigh in at just 20KB) but pernicious banking Trojan was released through an underground forum last week, reports Danish security …
John Leyden, 11 Jul 2014
Spam image

spɹɐʍʞɔɐB writing is spammers' new mail filter avoidance trick

Spammers are writing emails backwards in an attempt to sneak past spam filters, security researcher Brian Bebeau has found. The pests were using left-to-right override code intended to facilitate the use of bi-direction text, such as a document that included English and Hebrew. The Trustwave researcher said the tactic had a …
Darren Pauli, 12 Sep 2014
Spam

BILLION email address spam scam: Feds collar two blokes, hunt another

The US Department of Justice (DoJ) has shed light on what it's calling the largest computer security breach in American history – after three men were charged with hacking email hosting firms, stealing email addresses, and then using the businesses' data centers to run a spam operation. "These men — operating from Vietnam, the …
Iain Thomson, 06 Mar 2015
North Korean leader Kim Jong-un

Prez Obama slaps sanctions on Norks in payback for Sony hack

The Obama administration has imposed new economic sanctions on North Korea in retaliation for its alleged, and frankly barely believable, involvement in the Sony Pictures mega-hack. Citing the Norks' "destructive and destabilizing conduct," US Treasury Secretary Jacob Lew said in a statement on Friday that the Treasury …
Neil McAllister, 02 Jan 2015
DDoS image

London teen charged over Spamhaus mega-DDoS attacks

An unnamed London teenager has been charged with a series of criminal offences following a series of denial-of-service attacks against internet exchanges and the Spamhaus anti-spam service last year. The 17-year-old male from London was charged on Friday and faces computer misuse, fraud and money-laundering offences at a hearing …
John Leyden, 30 Jun 2014
blackmail

DANGER: Is that 'hot babe' on Skype a sextortionist?

North Yorkshire police have issued a general warning after three men in the York area fell victim to sextortionists. Someone posing as a woman called Cathy Wong befriended each of the victims on Facebook before asking them to Skype her. During the online chat session, she enticed each of them into performing an indecent act, …
John Leyden, 14 Jan 2015
Pandemia

Rovnix Trojan infection outbreak infects 130,000 machines in Blighty

A new cluster of infections by the Rovnix Trojan has infected more than 130,000 Windows computers in the UK alone. The data-stealing malware is also affecting Germany, Italy, the US and Iran to a far lesser extent - 87 per cent of the computers infected are actually in the UK, according to anti-virus firm Bitdefender. Rovnix is …
John Leyden, 06 Nov 2014
The Register breaking news

European conference sets agenda for cybercrime fight

The Council of Europe has called for a worldwide implementation of its Convention on Cybercrime to fight the growing problem of economic crime on the web. During the fifth annual CoE conference on cybrecrime in Strasburg this week, participants spoke in favour of greater international cooperation in sharing existing tools, …
John Leyden, 26 Mar 2010

Brit cops nab six in Silk Road 2.0 drugs sting

British cops have arrested six people suspected of links to the online drugs bazaar Silk Road 2.0. Officers from the National Crime Agency made the arrests over allegations their targets had been selling drugs or working as administrators for the dark web narcotics store. All six suspects have been bailed following a police …
Jasper Hamill, 07 Nov 2014
Department of Homeland Security

Top senator blasts US Homeland Security for leaving cyber-drawbridge down

A member of the US Senate's Homeland Security Committee has slammed the Department of Homeland Security over America's cyber-defenses: Tom Coburn (R-OK) said the agency is failing to protect the nation's IT infrastructure despite at least $700m in funding. "The nature of cybersecurity threats – and the ability of adversaries to …
Iain Thomson, 08 Jan 2015
Crime in Russia

Sneaky Russian hackers slurped $15 MILLION from banks

Millions of dollars, credit cards and intellectual property have been stolen by a newly discovered group of cyber criminals. The Anunak hackers group has been involved in targeted attacks and espionage since 2013, we now know, and targets banks and payments systems in Russia and former CIS countries, according to joint research …
John Leyden, 22 Dec 2014
Wifi grumpy cat

Pay-by-bonk 'glitch' means cards can go kaching-for-crims

Researchers from the UK's Newcastle University have outlined how pay-by-bonk cards can be p0wned by a “rogue POS terminal” running on a mobile phone. To be detailed on Wednesday at the 21st ACM Conference on Computer and Communications Security, the attack is said to rely on a “rogue POS terminal” being set up with a pre-set …
News team, 04 Nov 2014
Ransom note saying "Pay Up" in blackmail type

Panicked teen hanged himself after receiving ransomware scam email

An autistic 17-year-old college student has hanged himself after receiving a ransomware scam. Joseph Edwards was alarmed after receiving an email that falsely claimed he'd been spotted browsing illegal websites and needed to pay £100 (payable in Ukash electronic money) or face being prosecuted. The email pushing the well-known …
John Leyden, 23 Jan 2015
Tommy lee image

Aussie feds consider job offer to 'LulzSec leader' who wasn't

Shackled hacker and supposed "leader of Lulzsec" Matthew Flannery is welcome to apply for a job with the Australian Federal Police (AFP_, the force says. Flannery was arrested last April as one of two crackers behind the defacement of the then-unpatched Narrabri shire council. He's since been sentenced to, and is serving, 15 …
Darren Pauli, 10 Nov 2014

CryptoLocker-style ransomware booms 700 PER CENT this year

CryptoLocker-style ransomware is eight times more common now than in January, going a long way towards overtaking fake police warning ransomware scams, according to Symantec. The disruption of the GameOver Zeus banking trojan botnet back in late May took away one of the main distribution methods for CryptoLocker itself. …
John Leyden, 12 Sep 2014

Trustwave gobbles up Application Security, gorges itself on tech

Data security biz Trustwave has acquired fellow data security provider Application Security, a startup that specialises in automated database security scanning technologies. Financial terms of the deal, announced on Monday, were undisclosed. Privately-held Application Security develops security software for relational databases …
John Leyden, 12 Nov 2013

Routine WHAT NOW? Bank of England’s CHAPS payment system goes TITSUP

The CHAPS system used to handle most bank-to-bank transfers in the UK has collapsed, with all mortgage payments currently on pause. We were told that the problem was due to an update over the weekend, when the details of new CHAPS users were being added and old ones removed. This is meant to be a routine operation, but a glitch …
Jasper Hamill, 20 Oct 2014
The Register breaking news

Former White House advisor wants cybercrime haven crackdown

A former White House security advisor has urged a crackdown on rogue states that serve as a "safe haven" for cybercrime, along with a fundamental rethink of internet architectures. Richard Clarke, who served as special advisor to the President George W Bush on cybersecurity, told delegates to the RSA Conference in London that …
John Leyden, 14 Oct 2010