iTnews
  • Home
  • News
  • Technology
  • Security

Grand Theft Auto V 'leaked' to bittorrent

By Adam Greenberg on Sep 9, 2013 8:00AM
Grand Theft Auto V 'leaked' to bittorrent

Foists malware.

A malware-laden and fake copy of the much-anticipated game Grand Theft Auto V is circulating on bit torrent sites.

The file was an elaborate scam to charge mobile devices and jack up computers with malware.

Users who choose to install the highly anticipated game will be unable to finish until they completed a survey and received a confirmation code, according Romania-based security company Bitdefender.

The survey could only be completed by sending an SMS text message to a number that was a hidden premium service that charged a daily fee until the service was manually cancelled.

While charges surreptitiously racked up on mobile devices , users were provided with an installation of video game The Cave, along with malware (Trojan.GenericKDV.1134859).

The malware could steal data and enslave the victim machine in a botnet. Service providers should be phoned to put a stop to the daily SMS text message fees.

This article originally appeared at scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
grand theft auto vsecuritytorrent

Partner Content

Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By Adam Greenberg
Sep 9 2013
8:00AM
0 Comments

Related Articles

  • Poor patching creates easy zero-day vulnerability reuse
  • Atlassian patches Jira server plugin to fix vulnerability
  • Monash University opens public bug bounty
  • Sophisticated ZuoRAT attack targets home workers
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

PayTo rollout kicks off

PayTo rollout kicks off

Neobank Volt exits the banking industry

Neobank Volt exits the banking industry

TPG Telecom puts fresh targets on IT simplification

TPG Telecom puts fresh targets on IT simplification

Digital Nation

COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
The security threat of quantum computing
The security threat of quantum computing
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.