WAPDropper malware hooks you up to premium telecoms services
A newly discovered malware strain has been identified in the wild that unwittingly registers victims for premium services provided by legitimate telecoms firms. Named WAPDropper, the malware downloads and executes a payload, dropping a wireless application protocol (WAP) premium dialer which subscribes its victims to premium services in Thailand and Malaysia without their knowledge or consent. Th
e malware strain comprises two separate modules, according to Check Point Research, including a dropper module responsible for downloading the second-stage malware, and a premium dialer module that is responsible for the subscription element. SEE MORE Weekly threat roundup: Cisco, BlueKeep, Apache Unomi SEE MORE Qualcomm chip flaws put ‘millions’ of Android devices at risk SEE MORE Qbot malware surges into the top-ten most common business threats This campaign identified by the researchers subscribes users to premium services offered by legitimate telecoms providers in Thailand and Malaysia. The scheme is centred on making calls to premium-rate numbers, which will, in turn, generate profit for the cyber criminals who collaborate with the owners of these particular phone numbers. After the application is first installed on a device using third-party app stores, WAPDropper contacts the command and control server and receives the payloads to execute. This first payload is the premium dialer module, which opens a tiny web window and contacts premium services. Once WAPDropper opens the landing pages, it’ll attempt to subscribe the victim to these services. Alarmingly, the process includes a mechanism that can bypass the CAPTCHA security requirement, which must be overcome to complete a transaction. It’s at this stage that the operators deploy the services of Super Eagle, a Chinese firm that offers a machine learning tool for image recognition. When the malware submits the verification code image to the service, the platform returns the coordinate position of the recognition result in the image, then parses the coordinate simulation landing. The malware also attempts to avoid detection by hiding its icon to prevent users from spotting it on their device and uninstalling the app. The malware also performs checks to determine whether the victim is using a proxy or virtual private network (VPN).
Date: 2020-11-24
itpro.co.uk
In search of the perfect scanner (2020-07-12) | By now its clear that the myth of the paperless office is just that a myth But dont write off the whole idea: while it might not be realistic to ditch physical documents entirely you can certainly reduce your reliance on them and reap the rewards of a paper-light workflow For a start if your office is packed with bulky filing cabinets you can reclaim that space by digitising statements invoices sa.. |
What is digital transformation? (2019-08-07) | Digital transformation is one of those phrases you may dismiss as business jargon but its so much more than that It can play a crucial role inevolving and growing your business Most organisations will have gone through some sort of digital transformation in their lifetime The right technology is often key to staying competitive and during this challenging and uncertain year adding digital capabili.. What is digital transformation? |
Dynabook Portégé X50-G-10V: Too much for too little (2020-11-24) | Its been a hectic time for Toshibas laptop business which was partially purchased by Sharp in 2018 renamed to Dynabook and then bought outright by Sharp in August Now thats all out of the way this organisation is getting its focus back and producing laptops like the 1419 exc VAT Portg X50-G-10V Dynabook Portg X50-G-10V review: Design The X50 is made from black magnesium alloy and it has subtle des.. Dynabook Portégé X50-G-10V: Too much for too little |
Apple MacBook Air (2020) review gallery (2020-12-02) | Apples latest MacBook Air delivers almost everything we could have hoped for |
Hackers steal 8.3 million user records from 123RF (2020-11-13) | Hackers have stolen 83 million user data records from royalty-free stock photo website 123RF The cyber criminals breached a server belonging to 123RFs parent company Inmagine Group to access the data According to a report from Bleeping Computer a known data breach broker began selling the data containing user information last weekend The data reportedly includes 123RF members full names email addr.. |
It’s too late to let slip the robodogs of war now we have ransomware (2020-11-10) | TV and film have a lot to answer for when it comes to misconceptions of artificial intelligence Despite rapid advancements in the field there will never be a bionic man or woman David Hasselhoff will never have an autonomous car to fight crime and robots bearing a remarkable resemblance to Arnold Schwarzenegger will never travel back in time to kill someones mum We have much better ideas these day.. |
IT Pro 20/20: Why tech can’t close the diversity gap (2020-12-01) | Welcome to the tenthissue ofIT Pro 20/20 ourdigital magazine that brings all of the previous months most important tech issues into clear view Diversity has always been a challenge for the technology industry Its one of those few industries that struggles to maintain a varied talent pool with white males still taking the single biggest share of the employee demographic This is a problem weve known.. |
IBM and AMD partner on AI and confidential computing (2020-11-12) | IBM and AMD have announced a multi-year joint development agreement which aims to strengthen and expand the security and artificial intelligence AI offerings of the two tech giants The partnership will work on extending open source software open standards and open system architectures in order to drive confidential computing within hybrid cloud environments The project also aims to support a broad.. IBM and AMD partner on AI and confidential computing |
What is multi-cloud? (2019-09-25) | Cloud services have now become a crucial part of many businesses IT infrastructure Over the last few years organisations big and small have been moving to the cloud as part of their digital transformation efforts and many new start-ups begin their journey using cloud technology as so-called cloud-native companies Theres a good reason for this mass movement to the cloud Shifting on-site IT infrastr.. What is multi-cloud? |
BenQ PD3220U review: A fine and flexible screen (2020-11-20) | It isnt enough for manufacturers to lure creative pros with the promise of calibrated panels that have a Delta E under two anymore thats rapidly becoming the standard for mid-range screens Instead the likes of BenQ must entice people with features beyond normal monitors BenQ hopes that its Hotkey Puck G2 will do exactly that This connects to a port at the rear and provides a handy dial for control.. |