underground

MazelTov and the Russian Underground Have It Going for Your Android Devices. And It's Not for "Good Luck"

The Internet has been a good place for individuals and businesses. However, it's fast becoming a leading medium for criminals in the cyber war against people like you and I. One example is the Russian underground. On their websites, you can find any type of Trojans, exploits, rootkits and fake documents. They also sell for examples Trojans, exploits and exploit bundles, fake documents, and stolen credit cards and credentials. These websites change continually, but you only need to access one of their forums to find where they sell things to commit cyber crime.

One popular malware today costs only $3,000. The name of the malware is MazelTov meaning "good luck" in Hebrew. Unlike the original meaning, MazelTov, a toolkit, is designed to help cyber criminals quickly spread malware to computers, tablets, and mobile phones. Hackers still produce viruses and spyware, but malware is much easier to spread to any device. Spreading malware has become the de facto of cyber crime. A report on the Russian underground from Trend Micro shows how profitable this type of malware for the "black" market and those who purchase them. You can read the report at Security Affairs.

Those who use the MazelTov’s kit can monetize an Android device by installing malware on an Android phone, either to steal the user's money or to take his data and sell it back on this market. According to Security Intelligence, the customers of the toolkit will receive "a package of goodies that include two registered domains, a landing page template to be used as the download site, a method to increase infection rates through social engineering, one-month paid hosting for the server of the malware application and consulting services to get immediate results."

The report also shows how the Russian underground market has grown in the last three years. Buying and selling tools and services to devise security attacks are quite trendy today, fueled by the high adoption rate of Android devices and the easy way to commit crimes on the Internet. Prices have dropped at the Russian underground sites. The Trojan Phoenix that was worth $500 in 2011 is now worth less than $30. The low prices make it even more affordable for anyone with bad intentions to purchase these underground products and services and immediately start their business.

On the contrary, legitimate businesses pay a hefty price. Target, a large US retailer, faced a class action lawsuit by the customers having their credit and debit cards hacked in 2014 and had agreed to pay out $10 million to settle the lawsuit. While many hacks and breaches don't result in lawsuits and fines, they still cost organizations in term of man effort to fix the issues, business loss due to down time, not to mention the loss of their customer confidence and trust.

To know more about how you can protect your valuable data and prevent similar exploits, please send us an email at support@teskalabs.com.


TurboCat.io

Data encryption tool for GDPR

More information


You Might Be Interested in Reading These Articles

What Is Mobile Application Containerization or Wrapper, and Why It Needs to Go?

Containerization is an alternative for full machine virtualization. You probably know well-known containerization technology from Docker or Rocket. However, this article addresses the pros and cons of mobile “containerization” or wrapper used to isolate the mobile app from the mobile operating system or other applications installed on the same device. These type of “containerization” work in a different way.

Continue reading ...

tech security

Published on September 27, 2016

How DDoS Attacks Can Sink Your Business

Distributed Denial of Service (DDoS) is a form of cyberattack which makes the target internet service inaccessible. “Distributed” refers to the fact that the attack comes from multiple sources, to have a bigger impact on the target, as it cannot cope with such a large amount of traffic. In recent years, DDoS attacks have become more and more complex, with many combinations of different attach approaches being used.

Continue reading ...

security

Published on February 07, 2017

Better Late Than Never - WhatsApp Is Using End-to-End Encryption – Finally!

Can you imagine leaving your house without locking the main door while you are out? I guess not. Locking the door is a routine that we're doing automatically, so why there is so much noise about the latest update from WhatsApp that seems like the company has just reinvented communication encryption?

Continue reading ...

security

Published on April 07, 2016