. | . |
International police bust 'FluBot' phone scam By Danny KEMP The Hague (AFP) June 1, 2022 Police in 11 countries have taken down a mobile phone scam dubbed FluBot that spread around the world via fake text messages, Dutch and EU police said on Wednesday. Dutch cybercops led an operation in May targeting the malware, which infects Android phones using texts which pretend to be from a parcel firm or which say a person has a voicemail waiting. Hackers would then steal bank details from infected phones, which automatically sent messages to other mobiles in the user's contact list, passing on the scam like a flu virus. "To date, we have disconnected ten thousand victims from the FluBot network and prevented over 6.5 million spam text messages," Dutch police said in a statement. The EU's police agency Europol said FluBot was among "the fastest-spreading mobile malware to date" and was "able to spread like wildfire due to its ability to access an infected smartphone's contacts." Police had made the malware "inactive" but are still hunting the culprits, it said. "This FluBot infrastructure is now under the control of law enforcement, putting a stop to the destructive spiral," Europol said. The countries involved in carrying out the investigation were Australia, the United States, Belgium, Finland, Hungary, Ireland, Romania, Spain, Sweden, Switzerland, and the Netherlands, coordinated by Europol's cybercrime centre. FluBot became one of the world's most notorious cyberscams after it first emerged in December 2020, "wreaking havoc" around the world, Europol said. The agency said the bug had compromised a "huge number of devices worldwide", especially in Europe and the United States, with "major incidents" in Spain and Finland. Australian media said last year that FluBot was spreading "like a tsunami" with some users being bombarded by texts. - 'Very dangerous' - Details of how police took down the scam remain sketchy, with officials saying they do not want criminals to know how they busted it. Dutch police said a cybercrime team in the eastern Netherlands had taken down FluBot by "intervening and disrupting the criminal process", without giving more details. Europol said the takedown did not involve removing any physical infrastructure such as servers but also refused to say more. "The Dutch police found another way to disrupt the criminal activity," a Europol spokeswoman told AFP. But FluBot's method was simple, according to Europol and the Dutch police. It would arrive "mainly via a fake SMS on behalf of a well-known parcel delivery service" or saying the user had a voicemail to listen to. They would then be asked to click on a link to download an app from the parcel service to track a package, or to listen to the voicemail. But in fact FluBot would install the malware on their phones. The fake app would then ask permission to access various other applications. Hackers could then see their victims entering passwords for banking, credit card or cryptocurrency apps and steal from them, Europol said. What made it "very dangerous" was its ability to access a phone's contact list and then send fake texts to other phones. "Victims often do not know that they have installed the malware. The further spread of the malware also happens without the user of a mobile phone noticing," Dutch police. The scam only targeted phones with Google's Android operating system. Apple's iOS system was not affected. dk/jhe/pvh
New countermeasure against unwanted wireless surveillance Bochum, Germany (SPX) May 25, 2022 Smart devices are supposed to make our everyday lives easier. At the same time, however, they are a gateway for passive eavesdropping. To prevent possible surveillance of the movement profile within one's home, researchers from the Max Planck Institute for Security and Privacy, the Horst Gortz Institute for IT Security at Ruhr-Universitat Bochum and the Cologne University of Applied Sciences have developed a novel system for protecting privacy in wireless communication. The method, based on the technolo ... read more
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |