Tokyo police swoop on hentai malware crooks

Powered by SC Magazine
 

The malware scam worked by planting malicious code on a file sharing web site disguised as a version of the popular hentai or adult-themed games. Attempting to install the file brings up an online form requesting personal details.

Two Japanese men have been arrested on suspicion of fraud after being linked to the recent outbreak of 'hentai' malware scams which posted the personal details of infected users online.

The Daily Yomiuri newspaper reported that Tokyo police made what was the first arrest in Japan on suspicion of fraud using a computer virus, and only the second time in the country that virus writers have been arrested.

The malware scam worked by planting malicious code on a file sharing web site disguised as a version of the popular hentai or adult-themed games. Attempting to install the file brings up an online form requesting personal details.

The malware collects this information, along with screenshots of the victim's computer and other identifiable information such as operating system version and browser favourites, which are then placed on a publicly available web site, according to a blog post by Trend Micro senior security analyst Rik Ferguson.

The two men are also accused of sending emails to their victims promising to remove these details for a fee.

Around 5,000 personal computers have been infected with the virus, and the two suspects allegedly defrauded several people of several tens of thousands of yen, according to the Yomiuri.

Copyright ©v3.co.uk


Tokyo police swoop on hentai malware crooks
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  25%
TOTAL VOTES: 346

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 144

Vote