New malware steals users' money through mobile phones: Report

Agencies
September 10, 2017

New Delhi, Sep 10: A new malware Xafecopy Trojan has been detected in India which steals money through victims' mobile phones, cyber security firm Kaspersky said in a report.

Around 40 per cent of target of the malware has been detected in India.

"Kaspersky Lab experts have uncovered a mobile malware targeting the WAP billing payment method, stealing money through victims' mobile accounts without their knowledge," the report said.

Xafecopy Trojan is disguised as useful apps like BatteryMaster, and operates normally. The trojan secretly loads malicious code onto the device.

Once the app is activated, the Xafecopy malware clicks on web pages with Wireless Application Protocol (WAP) billing - a form of mobile payment that charges costs directly to the user's mobile phone bill. After this the malware silently subscribes the phone to a number of services, the report said.

The process also does not require user to register a debit or credit card or set up a user-name and password.

The malware uses technology to bypass 'captcha' systems designed to protect users by confirming the action is being performed by a human. In the captcha system, websites show a set of some letter or numbers which are required to be manually filled by the user.

"Xafecopy hit more than 4,800 users in 47 countries within the space of a month, with 37.5 per cent of the attacks detected and blocked by Kaspersky Lab products targeting India, followed by Russia, Turkey and Mexico," the report said.

Experts at Kaspersky Lab have found traces showing that cyber criminals gang promulgating other trojans are sharing malware code among themselves.

"Our research suggests WAP billing attacks are on the rise. Xafecopy's attacks targeted countries where this payment method is popular. The malware has also been detected with different modifications, such as the ability to text messages from a mobile device to premium-rate phone numbers, and to delete incoming text messages to hide alerts from mobile network operators about stolen money," Kaspersky Lab Senior Malware Analyst Roman Unuchek said.

Kaspersky Lab, Managing Director- South Asia, Altaf Halde said that Android users need to be extremely cautious in how they download apps.

"It is best not to trust third-party apps, and whatever apps users do download should be scanned locally with the Verify Apps utility. But beyond that, Android users should be running a mobile security suite on their devices.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 11,2020

Citing the current dismal aviation scenario, Air India is terminating the services of trainee cabin crew and cabin crew by withdrawing the offer of employment of those who were under training.

As per sources, the new crew and trainee pilots might reduce contracts from five years to one year. Sources said Air India is terminating 1,200 crew and employees who are more than 55-yr-old including 190 trainee pilots.

In a letter reviewed by IANS, Air India has informed an applicant who had been selected as cabin crew in August 2019 subject to successful completion of training.

"On behalf of Air India we would like to thank you for the interest shown by you in joining our organization. However, in view of the current aviation scenario, it would not be possible for Air India to impart any further training to you for engaging your services," the company said.

"In view of the above reasons, which are beyond the control of the company, it has been decided to discontinue your training arrangements and dispense with the offer of engagement with immediate effect. The bank guarantee furnished by you at the time of joining is returned herewith," Air India told the cabin crew.

"Once again on behalf of Air India we thank you for your cooperation and trust that you will appreciate the circumstances under which we are constrained to discontinue the training arrangements," the carrier said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 22,2020

Kochi, May 22: During the nationwide COVID-19 lockdown, Kerala recorded the highest number of cyber attacks followed by Punjab and Tamil Nadu, a study by anti-virus software firm K7 Computing said on Thursday.

In a statement issued in Chennai, the company said its K7 Computing's Cyber Threat Report, a comprehensive analysis of cyber attacks during the lockdown has found that Kerala recorded the highest number of cyber attacks during this period. The report analyses various cyber attacks within India during the pandemic and reveals that threat actors targeted the state with COVID-themed attacks aimed at exploiting user trust.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period - the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu with 184 attacks, the company said.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level.

These attacks aimed to compromise computers and mobile devices to gain access to users' confidential data, banking details, and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users' sensitive data. Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better. Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost 6 and 4 times the number of attacks as Bengaluru users.

According to the statement, a majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users. These attacks were aimed at heightening users' fears and creating a sense of urgency to take action.

K7 Labs noticed phishing attacks where scamsters posed as representatives of the United States Department of Treasury, the World Health Organization (WHO), and the Centres for Disease Control and Prevention (CDC), the company said.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus.

"Covid-19 has created an ideal situation for various threat actors to target individuals and enterprises alike. The panic caused by the stringent lockdown measures and rapid spread of this virus has left many people looking for more information on the situation," J. Kesavardhanan, Founder and CEO of K7 Computing was quoted as saying in the statement.

"Threat actors exploit this fear to their advantage and scam users into downloading malicious software and divulging sensitive information like banking codes. The need to be cyber cautious has never been greater. This is more so in the case of corporates who have adopted a work from home policy hurriedly without adequate cyber hygiene. We have seen an increase in attacks on enterprises and SME employees as well," he added.

Such attacks are expected to continue till normalcy returns. Social engineering attacks targeted at winning users' trust will gain momentum.

Healthcare institutions, well-known government offices, and international organisations will continue to be a prime target throughout the pandemic, the statement said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 3,2020

Mumbai, Jul 3: In yet another move to keep Chinese technologies companies at bay, the Centre has cancelled the 4G upgradation tender for BSNL as it has decided to come up with fresh specifications for the upgrade process, sources said.

The Department of Telecommunications (DoT) is likely to issue a fresh tender in the next two weeks.

People in the know said that the fresh tender may not allow Chinese companies to participate and that the new tenders that will be floated in the next two weeks will emphasise on Make in India.

As the border tussle with China escalated last month and around 20 soldiers lost their lives, the government had last month asked both BSNL and MTNL not to use equipment of Chinese makers in their upgrading process to 4G facilities.

Huawei and ZTE are the major Chinese telecom equipment makers working with Indian telecom companies and they would be the hardest hit by the decision.

The impact may be felt in terms of the much-awaited 5G trials in the country. After much deliberation, the Centre last December decided to allow Huawei to take part in the 5G trials.

The cancellation of tender for BSNL's 4G upgradation comes after the Centre on Monday banned 59 Chinese apps including TikTok, WeChat and UC Browser.

A statement by the Ministry of Electronics and IT said that the decision was taken since "there is credible information that these apps are engaged in activities which are prejudicial to sovereignty and integrity of India, defence of India, security of state and public order".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.