Tokyo police swoop on hentai malware crooks

Powered by SC Magazine
 

The malware scam worked by planting malicious code on a file sharing web site disguised as a version of the popular hentai or adult-themed games. Attempting to install the file brings up an online form requesting personal details.

Two Japanese men have been arrested on suspicion of fraud after being linked to the recent outbreak of 'hentai' malware scams which posted the personal details of infected users online.

The Daily Yomiuri newspaper reported that Tokyo police made what was the first arrest in Japan on suspicion of fraud using a computer virus, and only the second time in the country that virus writers have been arrested.

The malware scam worked by planting malicious code on a file sharing web site disguised as a version of the popular hentai or adult-themed games. Attempting to install the file brings up an online form requesting personal details.

The malware collects this information, along with screenshots of the victim's computer and other identifiable information such as operating system version and browser favourites, which are then placed on a publicly available web site, according to a blog post by Trend Micro senior security analyst Rik Ferguson.

The two men are also accused of sending emails to their victims promising to remove these details for a fee.

Around 5,000 personal computers have been infected with the virus, and the two suspects allegedly defrauded several people of several tens of thousands of yen, according to the Yomiuri.

Copyright ©v3.co.uk


Tokyo police swoop on hentai malware crooks
 
 
 
Top Stories
The ethics of security
[Blog post] Where did that zero-day go?
 
Rio Tinto's big data play delivers promised ore
Returns trickle in from long-term technology investment.
 
Time management tips for CIOs
[Blog post] How to get to the genba.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1149

Vote