• About
  • Advertise
  • Careers
  • Contact
Saturday, March 25, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security Malware

Currently, users mostly from in Eastern Europe & Russia are being targeted by this botnet.

by Cyber360 News
November 11, 2019
in Malware
0
Currently, users mostly from in Eastern Europe & Russia are being targeted by this botnet.
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

Currently, users mostly from in Eastern Europe & Russia are being targeted by this botnet.

Recently, researchers from the Czech Technical University, UNCOYO University based in Argentina and Avast Security have found an Android botnet named Geost by collaborating in on the investigations and have presented it at the Virus Bulletin 2019 conference held in London.

It was uncovered initially when its traffic was captured by a HtBot Malware on the server. The malware in question was being used to access millions of Euros in bank accounts based in Eastern Europe & Russia compromising more than 800,000 victims.

See: Android users installed 172 malicious apps 335m times last month

New Android banking trojan Geost botnet infects thousands of devices

The connection between Geost and HtBot (Image credit: Avast)

The botnet was basically composed of numerous Android phones which were were infected by getting them to download malicious applications that had been uploaded by attackers on third-party Android stores. Using access to text messages on these phones, the malware took advantage of a common practice of Russian banks to send users plaintext passwords via SMS. In cases where this technique did not work, other methods such as the apps asking for login credentials were used.

See: Clones of popular Adblockers caught ad frauding millions of Chrome users

With the help of 13 command and control servers, over 140 domains and over 140 APKs at its disposals, things were going pretty well for them – since 2016 – until the group members started making basic mistakes. These were those that you could reasonably expect from newbies but our cybercriminals here didn’t fail to disappoint either.

Among these, they trusted a malicious proxy network, used their command and control server along with chatting without encryption and kept on using the same services lest caring to cover their tracks. One such chat session on Skype when accessed gave insight into the workings and the mindset of the group going along the lines of:

Member 1: “Alexander, really, if we started together we need to finish it. Because for now this is working and we can earn money.”

Member 2:”I thought about it, and I’m not in.”

Member 1: “Understand, ok. Shame. If you change your mind write to me.”

According to Avast,

“These involved more than 6,200 lines, covering eight months of chats, and showed the private conversations of 29 people involved in different operations.”

The takeaway from this is best summed up by realizing that not all malware has to be complex and neither do hackers always have to be boxed up in super security facilities typing away on a green screen. Sometimes, to achieve the short term goal of earning quick cash, necessary security protocols are not followed resulting in such incidents.

Our advice remains the same as for the majority of such cases, if users avoid downloading applications and other files from untrusted sources, they wouldn’t be prey to any such malware inlet.

Did you enjoy reading this article? Kindly do like our page on Facebook and follow us on Twitter.

Cyber360 News

Cyber360 News

Next Post
SMBs are Exposed

SMBs are Exposed

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In