Tag Archive for: Intercepts

ALERT! Microsoft warns of dangerous Android malware on your phone that intercepts OTP, SMS too


Microsoft has warned of toll fraud malware on Android phones that can drain the wallet of the user. Here is what you need to know.

Is there malware on your phone? Microsoft has warned users of an Android malware called “toll fraud” that can drain the money in your wallet. Compared to other subcategories of billing fraud, which include SMS fraud and call fraud, toll fraud has unique behavior. SMS fraud or call fraud use a simple attack flow to send messages or calls to a premium number, while “toll fraud” has a complex multi-step attack flow that malware developers continue to improve, Microsoft said in a blog post.

“Toll fraud malware, a subcategory of billing fraud in which malicious applications subscribe users to premium services without their knowledge or consent, is one of the most prevalent types of Android malware – and it continues to evolve,” the blog post read.

Also read: Looking for a smartphone? To check mobile finder click here.

The company warned by saying, “for example, we saw new capabilities related to how this threat targets users of specific network operators. It performs its routines only if the device is subscribed to any of its target network operators. It also, by default, uses cellular connection for its activities and forces devices to connect to the mobile network even if a Wi-Fi connection is available.”

Also Read: Shocker! Mark Zuckerberg threatens Facebook employees; here is what ‘ruthless’ CEO wants

“Once the connection to a target network is confirmed, it stealthily initiates a fraudulent subscription and confirms it without the user’s consent, in some cases even intercepting the one-time password (OTP) to do so. It then suppresses SMS notifications related to the subscription to prevent the user from becoming aware of the fraudulent transaction and unsubscribing from the service,” Microsoft said.

Another unique behavior of toll fraud malware is its use of dynamic code loading, which makes it difficult for mobile security solutions to detect threats. Despite this evasion technique, Microsoft has identified characteristics that can be used to filter and detect this threat.

Mitigating…

Source…

How a few yellow dots burned the Intercept’s NSA leaker

Enlarge (credit: Ars Technica)

When reporters at The Intercept approached the National Security Agency on June 1 to confirm a document that had been anonymously leaked to the publication in May, they handed over a copy of the document to the NSA to verify its authenticity. When they did so, the Intercept team inadvertently exposed its source because the copy showed fold marks that indicated it had been printed—and it included encoded watermarking that revealed exactly when it had been printed and on what printer.

The watermarks, shown in the image above—an enhancement of the scanned document The Intercept published yesterday—were from a Xerox Docucolor printer. Many printers use this or similar schemes, printing faint yellow dots in a grid pattern on printed documents as a form of steganography, encoding metadata about the document into its hard-copy output. Researchers working with the Electronic Frontier Foundation have reverse-engineered the grid pattern employed by this class of printer; using the tool, Ars (and others, including security researcher Robert Graham) determined that the document passed to The Intercept was printed on May 9, 2017 at 6:20am from a printer with the serial number 535218 or 29535218.

Read 1 remaining paragraphs | Comments

Technology Lab – Ars Technica