Connect with us

Breaches

Malware Alert: Fake Android ‘The Interview’ Movie App Stealing Bank Account Information

Published

on

Reports surfacing are outlining a new Android app, designed to look like one for the controversial Sony movie, The Interview, are stealing thousands of bank account details.

Following the hype the movie set recently, with Sony being hacked and North Korea being blamed, Sony decided it would be fit to open the film to 300 movie theaters as well as online. While the film ended up making only $1 million from movie theater sales, it made $15 million from online rentals and purchases.

Also read: BitTorrent Inc. Offers Digital Release Bundle of ‘The Interview’ Film to Sony

The App Contains a Malware Known as a Two-Stage Banking Trojan

Android appsBut once the film was online, it was quickly posted on all major torrent sites, making it quite popular to download for free.

The creators of the malicious app were no doubt following the hype and chaos of the movie; preying on people unaware of the dangers that the internet can bring.

According to security researcher Graham Cluley, McAfee, the Technische Universitat Darmstadt and the Centre for Advanced Security Research Darmstadt (CASED) have all identified the malware. Jointly, they said that the threat has been active in South Korea for the past few days.

The torrent poses as an Android app, offering to download the movie for them onto their mobile device. Instead of downloading The Interview though, the app contains a malware known as a two-stage banking Trojan. Once the app is downloaded, the Trojan makes its way into the device and targets customers of Korean banks, as well as customers of the international Citi Bank.

What Is The Malware?

The Trojan in question is known as Android/Badaccents.

One of the more interesting features of the malware is that checks the Android’s manufacturing information and differentiates attacks accordingly.

If the phone belongs to someone in South Korea, it attacks. If the phone belongs to someone in North Korea, it will not infect; the app will simply display an error message.

To date, 20,000 devices has shown signs of infections. According to McAfee, all the infected devices seem to be relaying the bank account information back to a Chinese mail server.

Images from Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

Clay Gillespie a writer and reporter for many different platforms across the tech industry. He holds a B.S. in Public Relations from Ball State University, and freelances for different clients in technology and cryptocurrency. For more information, visit his personal website, claygillespie.com.




Feedback or Requests?

Breaches

Cryptocurrency Theft Reaches $1.1 Billion This Year: Carbon Black

Published

on

The cryptocurrency market continues to be extremely lucrative for cyber criminals. Through the first five months of 2018, they managed to steal roughly $1.1 billion worth of digital assets, according to a new study conducted by Carbon Black.

Dark Web Targets Crypto

In a newly released study, analysts at Carbon Black estimated 12,000 marketplaces and 34,000 offerings targeting crypto theft.  Their weapon of choice: malware.

“As was the case during the physical gold rush in the mid-1800s, there are criminals looking to exploit innocent parties of their earnings,” Carbon Black security strategist Rick McElroy said in a statement. “Carbon Black has found that modern-day cybercriminals are increasingly using the dark web to facilitate cryptocurrency theft on a large scale.”

McElroy later told CNBC in an interview that malware costs an average of $224, though it can be had for as little as $1.04. Although small on the surface, the malware market has grown to become a $6.7 million economy.

The crypto universe, which includes initial coin offerings and exchanges, is being ever more targeted by cyber criminals. Although dark web elements have been exploiting digital assets for several years, their efforts have increased since the bull market began in January 2017.

Earlier this year, hackers made off with $530 million worth of NEM tokens in a coordinated attack on Coincheck, a Tokyo-based digital currency exchange. The attack is the second largest on record in terms of monetary value.

The first high-profile attack on an exchange occurred in 2014 when thieves stole 750,000 bitcoins from Mt. Gox, another Tokyo-based platform. The exchange filed for bankruptcy shortly thereafter.

Privacy Coins and the Dark Web

While bitcoin may be the most popular cryptocurrency on the market, the dark web would much rather deal with privacy coins such as Monero.
A recent study by Recorded Future found Monero to be the most popular cryptocurrency on the dark web. Dash was second, followed by Ethereum, Litecoin and bitcoin.  Coins like Dash have attracted a larger following for their ease of use and low fees.

Despite Monero’s popularity, it is accepted only by a tiny minority of dark web vendors. Interestingly, Litecoin had the highest acceptance rate for coins other than bitcoin. Virtually every dark web vendor accepts bitcoin as a method of payment.

When it comes to absolute privacy, Zcash is considered one of the best cryptocurrencies on the market – at least, when compared with other major assets. However, when it comes to fungibility, Zcash is said to have limitations relative to bitcoin, Monero and others.

Disclaimer: The author owns bitcoin, Ethereum and other cryptocurrencies. He holds investment positions in the coins, but does not engage in short-term or day-trading.

Featured image courtesy of Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

4.5 stars on average, based on 457 rated postsSam Bourgi is Chief Editor to Hacked.com, where he specializes in cryptocurrency, economics and the broader financial markets. Sam has nearly eight years of progressive experience as an analyst, writer and financial market commentator where he has contributed to the world's foremost newscasts.




Feedback or Requests?

Continue Reading

Breaches

Coincheck Hackers Launder 40% of Stolen NEM Funds, Experts Say

Published

on

The hackers behind Coincheck’s massive NEM heist have successfully offloaded 40% of the stolen funds, according to new research by Tokyo-based consultancy group L Plus. The successful money laundering campaign highlights the ongoing challenges authorities face in bringing cyber criminals to justice.

Hackers Launder NEM

Analysts at L Plus believe that roughly 200 million NEM tokens, worth $79 million, have already been laundered through the dark web. However, the hackers likely pocketed a much smaller amount amid ongoing efforts to blacklist the tokens.

Nikkei Asian Review reported Monday that Coincheck was targeted with “suspicious traffic” for weeks leading up to the Jan. 26 heist. Citing a person close to the investigation, Nikkei said the attackers hacked an employee email and stole a private key needed to transfer the NEM tokens to the desired accounts. L Plus indicated that the attacker must have repeatedly accessed the Coincheck server to obtain the private key.

When the hack took place, the stolen NEM tokens were worth more than $400 million. Today, they are worth less than half that amount. The identity of the attackers remains unknown to this day. However, authorities have speculated that North Korea may have been responsible for the attack.

Coincheck plans to resume operations this week following a government-mandated freeze on all trading activity.

Japan Boosts Oversight

The attack has prompted Japan’s financial regulators to step up their oversight efforts of the cryptocurrency market. Last week, regulators penalized seven exchanges after deeming their internal controls insufficient to deal with a cyber attack.

Japan’s Financial Services Agency (FSA) slapped two exchanges – FSHO and Bit Station – with month-long suspensions. The remaining five exchanges – Bicrements, Coincheck, GMO Coin, Mr. Exchange and Tech Bureau – were given business improvement orders.

The FSA began conducting on-site inspections in late January following the Coincheck attack. Regulators have uncovered several issues, including a lack of customer protection measures and insufficient anti-money laundering controls.

Japan remains one of the most welcoming jurisdictions for cryptocurrency trading, but repeated attacks may prompt regulators to reconsider their relatively lax approach. Digital currency exchanges in Japan and elsewhere face a growing threat from cyber criminals looking to capitalize on the rising value of digital assets.

Disclaimer: The author owns bitcoin, Ethereum and other cryptocurrencies. He holds investment positions in the coins, but does not engage in short-term or day-trading.

Featured image courtesy of Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
2 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 5 (2 votes, average: 5.00 out of 5)
You need to be a registered member to rate this.
Loading...

4.5 stars on average, based on 457 rated postsSam Bourgi is Chief Editor to Hacked.com, where he specializes in cryptocurrency, economics and the broader financial markets. Sam has nearly eight years of progressive experience as an analyst, writer and financial market commentator where he has contributed to the world's foremost newscasts.




Feedback or Requests?

Continue Reading

Breaches

Skepticism Grows Over BitGrail’s Supposed $167 Million Hack

Published

on

A relatively unknown cryptocurrency exchange by the name of BitGrail has informed its users of a coordinated cyber attack targeting Nano (XRB) tokens. However, the incident does not appear to be holding up to scrutiny after the founder of the exchange made an odd request to the developers of Nano shortly after discovering the alleged theft.

BitGrail Exchange Allegedly Compromised

The Italian exchange issued a notice to its clients last week informing them that 17 million XRB tokens were compromised in a cyber attack. The XRB token, formerly known known as Raiblocks, is valued at $9.80 at the time of writing for a total market cap of $1.3 billion. That puts the total monetary loss of the supposed heist at nearly $167 million.

Parts of the notice have been translated into English from the original Italian by Tech Crunch, a media company dedicated to startups and technology news. According to the agency,  BitGrail has stated the following:

“… Internal checks revealed unauthorized transactions which led to a 17 million Nano shortfall, an amount forming part of the wallet managed by BitGrail… Today a charge about those fraudulent activities has been submitted to the competent authorities and now is under police investigation.”

The notice indicated that all transactions have been put on hold until authorities complete their investigation.

Very little is known about BitGrail, as it is not listed among the 183 exchanges whose volume is ranked by CoinMarketCap.

Suspicion Grows

Unlike other crypto heists, the circumstances surrounding the alleged BitGrail attack have been met with widespread suspicion. As David Z. Morris of Fortune rightly notes, this isn’t the first time BitGrail has suspended Nano withdrawals. The same thing happened in early January when the exchange halted not only Nano, but Lisk and CryptoForecast transactions as well.

The suspension was followed by an announcement that the exchange was taking measured steps to verify users and enforce anti-money laundering requirements. It was around this time that users became suspicious that BitGrail was going to cut and run with their tokens.

BitGrail founder Francesco Firano made an unusual request to the developers of Nano following the alleged attack: he asked them to fork their record, a move that would essentially restore the stolen funds.

Nano officially rejected the request on Friday, the day after Firano supposedly discovered the stolen coins. In a post that appeared on the Nano Medium page, the team said:

“We now have sufficient reason to believe that Firano has been misleading the Nano Core Team and the community regarding the solvency of the BitGrail exchange for a significant period of time.”

Last month, hackers made off with more than $400 million worth of NEM tokens stolen from Coincheck, a Japan-based cryptocurrency exchange. The coins have yet to be recovered and the perpetrators remain at large. In 2014, a cyber heist brought down Mt Gox, which was the world’s largest exchange.

Disclaimer: The author owns bitcoin, Ethereum and other cryptocurrencies. He holds investment positions in the coins, but does not engage in short-term or day-trading.

Featured image courtesy of Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
1 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 5 (1 votes, average: 5.00 out of 5)
You need to be a registered member to rate this.
Loading...

4.5 stars on average, based on 457 rated postsSam Bourgi is Chief Editor to Hacked.com, where he specializes in cryptocurrency, economics and the broader financial markets. Sam has nearly eight years of progressive experience as an analyst, writer and financial market commentator where he has contributed to the world's foremost newscasts.




Feedback or Requests?

Continue Reading

11 of 15 Seats Available

Learn more here.

Recent Comments

Recent Posts

A part of CCN

Hacked.com is Neutral and Unbiased

Hacked.com and its team members have pledged to reject any form of advertisement or sponsorships from 3rd parties. We will always be neutral and we strive towards a fully unbiased view on all topics. Whenever an author has a conflicting interest, that should be clearly stated in the post itself with a disclaimer. If you suspect that one of our team members are biased, please notify me immediately at jonas.borchgrevink(at)hacked.com.

Trending