underground

MazelTov and the Russian Underground Have It Going for Your Android Devices. And It's Not for "Good Luck"

The Internet has been a good place for individuals and businesses. However, it's fast becoming a leading medium for criminals in the cyber war against people like you and I. One example is the Russian underground. On their websites, you can find any type of Trojans, exploits, rootkits and fake documents. They also sell for examples Trojans, exploits and exploit bundles, fake documents, and stolen credit cards and credentials. These websites change continually, but you only need to access one of their forums to find where they sell things to commit cyber crime.

One popular malware today costs only $3,000. The name of the malware is MazelTov meaning "good luck" in Hebrew. Unlike the original meaning, MazelTov, a toolkit, is designed to help cyber criminals quickly spread malware to computers, tablets, and mobile phones. Hackers still produce viruses and spyware, but malware is much easier to spread to any device. Spreading malware has become the de facto of cyber crime. A report on the Russian underground from Trend Micro shows how profitable this type of malware for the "black" market and those who purchase them. You can read the report at Security Affairs.

Those who use the MazelTov’s kit can monetize an Android device by installing malware on an Android phone, either to steal the user's money or to take his data and sell it back on this market. According to Security Intelligence, the customers of the toolkit will receive "a package of goodies that include two registered domains, a landing page template to be used as the download site, a method to increase infection rates through social engineering, one-month paid hosting for the server of the malware application and consulting services to get immediate results."

The report also shows how the Russian underground market has grown in the last three years. Buying and selling tools and services to devise security attacks are quite trendy today, fueled by the high adoption rate of Android devices and the easy way to commit crimes on the Internet. Prices have dropped at the Russian underground sites. The Trojan Phoenix that was worth $500 in 2011 is now worth less than $30. The low prices make it even more affordable for anyone with bad intentions to purchase these underground products and services and immediately start their business.

On the contrary, legitimate businesses pay a hefty price. Target, a large US retailer, faced a class action lawsuit by the customers having their credit and debit cards hacked in 2014 and had agreed to pay out $10 million to settle the lawsuit. While many hacks and breaches don't result in lawsuits and fines, they still cost organizations in term of man effort to fix the issues, business loss due to down time, not to mention the loss of their customer confidence and trust.

To know more about how you can protect your valuable data and prevent similar exploits, please send us an email at support@teskalabs.com.




You Might Be Interested in Reading These Articles

80% of Androids Are Vulnerable to Linux TCP Flaw. But I Don’t Care!

Researchers from the University of California, Riverside, and the U.S. Army Research Laboratory have found an off-path TCP vulnerability [1] that affects more than 80% of Android mobile devices. Unlike a Man-in-The-Middle attack, you don't need to be in the middle of the communication to get hacked - all attackers need to know is who you communicate with.

Continue reading ...

android security

Published on October 11, 2016

Google has introduced new rules about how mobile app developers and companies deal with customer impact on apps across the board. What is it?

The new regulations call for increased transparency with regards to how apps make use of customer data. Developers need to ensure that the way they handle user data - from how they collect it to what it might be used for - is perfectly clear to all users. In Google’s words, developers must “limit the use of the data to the description in the disclosure”. In layman’s terms, this means that data use and privacy policies need to be clearly visible on app descriptions in the Google Play store, and not simply within the app itself.

Continue reading ...

security mobile android

Published on October 10, 2017

Snap to It: Mobile Secure Gateway Is In Your Future

The enterprise world is changing. In the past, enterprises built their IT infrastructure as isolated data fortresses and did everything they could to prevent outsiders from accessing their data. But now they need to open that fortress to allow communication via mobile technologies. And this hole is where hackers strike.

Continue reading ...

musing security

Published on July 07, 2015