MazelTov and the Russian Underground Have It Going for Your Android Devices. And It's Not for "Good Luck"
The Internet has been a good place for individuals and businesses. However, it's fast becoming a leading medium for criminals in the cyber war against people like you and I. One example is the Russian underground. On their websites, you can find any type of Trojans, exploits, rootkits and fake documents. They also sell for examples Trojans, exploits and exploit bundles, fake documents, and stolen credit cards and credentials. These websites change continually, but you only need to access one of their forums to find where they sell things to commit cyber crime.
One popular malware today costs only $3,000. The name of the malware is MazelTov meaning "good luck" in Hebrew. Unlike the original meaning, MazelTov, a toolkit, is designed to help cyber criminals quickly spread malware to computers, tablets, and mobile phones. Hackers still produce viruses and spyware, but malware is much easier to spread to any device. Spreading malware has become the de facto of cyber crime. A report on the Russian underground from Trend Micro shows how profitable this type of malware for the "black" market and those who purchase them. You can read the report at Security Affairs.
Those who use the MazelTov’s kit can monetize an Android device by installing malware on an Android phone, either to steal the user's money or to take his data and sell it back on this market. According to Security Intelligence, the customers of the toolkit will receive "a package of goodies that include two registered domains, a landing page template to be used as the download site, a method to increase infection rates through social engineering, one-month paid hosting for the server of the malware application and consulting services to get immediate results."
The report also shows how the Russian underground market has grown in the last three years. Buying and selling tools and services to devise security attacks are quite trendy today, fueled by the high adoption rate of Android devices and the easy way to commit crimes on the Internet. Prices have dropped at the Russian underground sites. The Trojan Phoenix that was worth $500 in 2011 is now worth less than $30. The low prices make it even more affordable for anyone with bad intentions to purchase these underground products and services and immediately start their business.
On the contrary, legitimate businesses pay a hefty price. Target, a large US retailer, faced a class action lawsuit by the customers having their credit and debit cards hacked in 2014 and had agreed to pay out $10 million to settle the lawsuit. While many hacks and breaches don't result in lawsuits and fines, they still cost organizations in term of man effort to fix the issues, business loss due to down time, not to mention the loss of their customer confidence and trust.
To know more about how you can protect your valuable data and prevent similar exploits, please send us an email at support@teskalabs.com.
Most Recent Articles
- A beginner-friendly intro to the Correlator for effective cybersecurity detection
- Inotify in ASAB Library
- From State Machine to Stateless Microservice
- Entangled ways of product development in the area of cybersecurity #3 - LogMan.io
- Entangled ways of product development in the area of cybersecurity #2 - BitSwan
You Might Be Interested in Reading These Articles
TeskaLabs Ltd was Innovate UK Funding Competition Winner in 2018
While every company is drawn to answering big questions and making new discoveries, not everyone is excited about how to get there: securing money for growth. Even with billions spent on business research and development around the world, there is considerable competition for funds.
Published on November 01, 2018
How TeskaLabs Helped O2 Improve Customer Satisfaction of eKasa Point-of-Sale (POS), the Most Successful POS Product / Mobile Cash Register on the Czech Market
In 2016 the Czech government introduced a new law that required businesses to report their sales and provide Electronic Evidence of Sales (EET). This law calls for the adoption of a more modern point-of-sale system that enables businesses to meet regulatory requirements set forth under this law. During the next two years, the law will gradually impact more than three hundred thousand companies in the Czech Republic. O2, the largest integrated telecommunications provider in the Czech market, observed that many would need help complying with this law, maintaining data security and demanding excellent customer support.
Published on August 08, 2017
The Security Vulnerability That Puts Millions of Application Backends at Risk. Yours Included
FoxGlove Security researchers published a serious vulnerability that can put millions of application backend, including mobile backend, at risk. Mobile applications use the same web-app technology for their backends, thus suffer the same vulnerability. Mobile application servers are inherently insecure because they consist of extensive stacks of software. Each piece can contain risky zero-day vulnerabilities.
Published on December 15, 2015