Thursday, June 1, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Malware

Police arrest couple suspected of running malware encryption service

Researcher by Researcher
April 10, 2023
in Malware
0
Police arrest couple suspected of running malware encryption service
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


British police arrested a man and a woman earlier this week, suspected of operating a website which offered services to online criminals which could help them evade detection by anti-virus software.

British police arrested a man and a woman earlier this week, suspected of operating a website which offered services to online criminals which could help them evade detection by anti-virus software.

Related articles

Aggressive Android ransomware spreading in the USA

Aggressive Android ransomware spreading in the USA

April 11, 2023
The evolution of ransomware: From PC Cyborg to a service for sale

The evolution of ransomware: From PC Cyborg to a service for sale

April 11, 2023

The couple, both aged 22, were arrested in Colchester, Essex, are alleged to have run the reFUD.me website, used by malware authors to encrypt their creations, rewriting malicious code so it is no longer easily detected by anti-virus products. In this instance, “FUD” does not stand for “Fear, Uncertainty and Doubt” but “Fully UnDetectable”.

The site wasn’t being run philanthropically by its owner, who went by the handle of ‘Killamuvz’. Instead, those wishing to encrypt their malware were charged $20 per month (or $90 for lifetime usage) for a license to use the Cryptex encryption service according to a statement issued by the National Crime Agency’s National Cyber Crime Unit.

In addition, the site offered to scan malicious programs against a wide array of anti-virus products, helping criminals determine that as few security products as possible were capable of detecting their malware – increasing the chances of successful infection.

According to statistics displayed on the reFUD.me website, there have been more than 1.2 million scans via the site since February 2015.

Of course, there are legitimate services available (VirusTotal is probably the most well known) which also offer to scan files against a large number of anti-virus products, but the key difference is that reFUD.me promised it would not share uploaded files with the security community.

And the promised privacy offered to malware authors is what has made the service popular with the dark side of the web. Following the arrests earlier this week and the takedown of the reFUD.me website, however, some of the site’s former clients are expressing concern on hacking forums that they might expect a visit from the police next.

Hacking forum

Steve Laval, from the NCA’s National Cyber Crime Unit, offered the following advice to computer users:

“Although the website offered services designed to help circumvent anti-virus software, computer users can protect themselves from most malware threats by taking some simple precautions. The NCA urges all internet users to ensure they have up to date anti-virus software installed on their machines and to avoid clicking on unknown or suspicious links or email attachments.”

The National Crime Agency were helped in the investigation by experts from Trend Micro – a great example of how the infosec community can work hand-in-hand with the authorities in the fight against cybercrime.

The arrested man and woman, whose names have not been released, have been bailed until February 2016 pending further enquiries.



Source link

Tags: ArrestcoupleencryptionmalwarepolicerunningServiceSuspected
Share76Tweet47

Related Posts

Aggressive Android ransomware spreading in the USA

Aggressive Android ransomware spreading in the USA

April 11, 2023
0

The latest ESET discovery of the first known Android lock-screen-type ransomware that spreads in the wild and sets the phone’s...

The evolution of ransomware: From PC Cyborg to a service for sale

The evolution of ransomware: From PC Cyborg to a service for sale

April 11, 2023
0

A look back at how ransomware – a type of malware used mostly for hijacking user data – has evolved...

Using DroidJack to spy on an Android? Expect a visit from the police

Using DroidJack to spy on an Android? Expect a visit from the police

April 11, 2023
0

Law enforcement agencies across Europe have searched homes this week, as part of an international crackdown against users of a...

Fighting talk from Great Britain as it says it will hit back against internet attacks

Fighting talk from Great Britain as it says it will hit back against internet attacks

April 11, 2023
0

British chancellor George Osborne has warned about the spectre of online terrorists attacking national infrastructure, and made some rather bold...

Android has some critical remotely‑exploitable security holes. But can you get the patch?

Android has some critical remotely‑exploitable security holes. But can you get the patch?

April 10, 2023
0

Remote code execution vulnerabilities have been found in the Android operating system, and patches released for Nexus devices. But what...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup /

June 1, 2023

Recent Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved