Chinese cops crack Fujacks hacks

Powered by SC Magazine
 

Eight suspects arrested in Hubei Province.

Chinese authorities have arrested a group of hackers in connection with the creation and distribution of the Fujacks worm.

The worm, also known as Whboy, made headlines in January because it converts the icons of infected programs into a picture of a panda burning joss-sticks as it steals usernames and passwords from online games players.

In the final quarter of 2006 alone, security firm Sophos detected 31,000 web pages containing versions of the Fujacks malware.

According to Chinese media reports, eight suspects have been held in Wuhan, the capital city of Hubei Province in central China.

One of those arrested, 25 year-old Li Jun, is accused of using the hacker handle 'Whboy' and creating the Fujacks malware.

A police statement quoted in local media reports stated that Li Jun earned more than $12,500 by selling the malware to other internet hackers.

Sophos published its annual Security Threat Report in January detailing the latest trends in malware around the world.

The report identified China-based web servers as being second only to the US for the amount of hosted malware. Some 30 per cent of the world's malware originates in China.

"The international community should applaud the Chinese authorities for investigating one of its first major cyber-crime cases," said Graham Cluley, senior technology consultant at Sophos.

Copyright ©v3.co.uk


Chinese cops crack Fujacks hacks
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 327

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  56%
 
No
  44%
TOTAL VOTES: 135

Vote