MazelTov and the Russian Underground Have It Going for Your Android Devices. And It's Not for "Good Luck"
The Internet has been a good place for individuals and businesses. However, it's fast becoming a leading medium for criminals in the cyber war against people like you and I. One example is the Russian underground. On their websites, you can find any type of Trojans, exploits, rootkits and fake documents. They also sell for examples Trojans, exploits and exploit bundles, fake documents, and stolen credit cards and credentials. These websites change continually, but you only need to access one of their forums to find where they sell things to commit cyber crime.
One popular malware today costs only $3,000. The name of the malware is MazelTov meaning "good luck" in Hebrew. Unlike the original meaning, MazelTov, a toolkit, is designed to help cyber criminals quickly spread malware to computers, tablets, and mobile phones. Hackers still produce viruses and spyware, but malware is much easier to spread to any device. Spreading malware has become the de facto of cyber crime. A report on the Russian underground from Trend Micro shows how profitable this type of malware for the "black" market and those who purchase them. You can read the report at Security Affairs.
Those who use the MazelTov’s kit can monetize an Android device by installing malware on an Android phone, either to steal the user's money or to take his data and sell it back on this market. According to Security Intelligence, the customers of the toolkit will receive "a package of goodies that include two registered domains, a landing page template to be used as the download site, a method to increase infection rates through social engineering, one-month paid hosting for the server of the malware application and consulting services to get immediate results."
The report also shows how the Russian underground market has grown in the last three years. Buying and selling tools and services to devise security attacks are quite trendy today, fueled by the high adoption rate of Android devices and the easy way to commit crimes on the Internet. Prices have dropped at the Russian underground sites. The Trojan Phoenix that was worth $500 in 2011 is now worth less than $30. The low prices make it even more affordable for anyone with bad intentions to purchase these underground products and services and immediately start their business.
On the contrary, legitimate businesses pay a hefty price. Target, a large US retailer, faced a class action lawsuit by the customers having their credit and debit cards hacked in 2014 and had agreed to pay out $10 million to settle the lawsuit. While many hacks and breaches don't result in lawsuits and fines, they still cost organizations in term of man effort to fix the issues, business loss due to down time, not to mention the loss of their customer confidence and trust.
To know more about how you can protect your valuable data and prevent similar exploits, please send us an email at firstname.lastname@example.org.
Data encryption tool for GDPRMore information
You Might Be Interested in Reading These Articles
A zero-day, also called zero-hour, vulnerability is a security flaw in the code that cyber criminal can use to access your network. Zero-day attacks call for new technologies built from the ground up for today’s advanced threat landscape. There is no known fix, and by the time hackers attack, the damage is already done
Published on May 12, 2015
I experienced a precious moment, discovering the cause which contributed to today's dire state of mobile application security. App developers think that if their apps do not deal with money, they should not have to care about app security. Is it true?
Published on February 24, 2015
In October 2015, Blakely Thomas-Aguilar did a great article on mobile security statistics on the VMware AirWatch blog that can and will send shivers down your spine. For example, she found that there was an increase of 18% in the number of Android vulnerabilities between 2011 and 2015.
Published on July 26, 2016