Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Target Rich Environment: Mobile Malware in China

timothy posted about 9 months ago | from the making-it-up-on-volume dept.

China 11

An anonymous reader writes with this excerpt from Help-Net Security (based on the linked Trend Micro report): "Every country's cybercriminal underground market has distinct characteristics, and with 500 million national mobile Internet users and the number continuously rising, the Chinese underground market is awash with cyber crooks buying and selling services and devices aimed at taking advantage of them. Trend Micro's senior threat researchers Lion Gu has been scouring forums, online shops and QQ chats to give us a sense of what is actually going on on this burgeoning mobile underground. Mobile apps that stealthily subscribe users to premium services are, naturally, very popular with cyber crooks in China as in the rest of the world. Premium service numbers can also be bought on underground markets. Network carriers usually assign premium service numbers to qualified service providers, but obviously some of them are not [averse to] selling them on to criminals."

Sorry! There are no comments related to the filter you selected.

Fire (0)

Anonymous Coward | about 9 months ago | (#46418363)

Maybe the great firewall of China could do so something useful and block it?

Can't SIM cards be traced? (1)

invictusvoyd (3546069) | about 9 months ago | (#46418407)

Just insert a SIM card (or more) and you can get cracking

Can't These SIM's be traced back to the spammers?
What stops the authorities from nabbing them , now that we have mega surveillance machineries.

Re:Can't SIM cards be traced? (0)

Anonymous Coward | about 9 months ago | (#46418625)

They can be duplicated/spoofed without much effort. If spammers kept using the same sim card for weeks at a time, maybe, sure.

Really? (0)

Anonymous Coward | about 9 months ago | (#46418537)

Why don't we plug the holes and develop software that isn't so unbelievably easy to hack? This is getting ridiculous, c'mon! I'm really getting sick of hearing about all of the flaws and backdoors in products. Clearly governments are using this to thier advantage, to spy on us, so they don't really mind.

Re:Really? (1)

tepples (727027) | about 9 months ago | (#46420439)

Why don't we plug the holes and develop software that isn't so unbelievably easy to hack?

Because end users will click through any permission wall if the program promises dancing pigs [wikipedia.org] .

Please stop using cyber* (1)

Timothy Hartman (2905293) | about 9 months ago | (#46418585)

It is is as silly to use the term cyber criminal as it is to grant patents on everyday things when used on the internet. Scams and confidence schemes are ages old and regardless of what the current technology is, criminals will take advantage of them. It can be telegram, telegraph, mail, telephone, email, mobile, or whatever. The vehicle doesn't change the act.

Re:Please stop using cyber* (2)

ShanghaiBill (739463) | about 9 months ago | (#46419847)

The vehicle doesn't change the act.

Yes it does. If you try to swindle people on the street, you are going to have far fewer marks, and you are far more likely to get caught. "Cyber" criminals can swindle people anonymously and from across national borders. Unless they do something stupid, like brag about it in a bar, or take a vacation where they are wanted, the have almost complete impunity. Mt Gox was robbed of $473M, and the perps apparently got away with it. How many armed bank robbers have ever got even $1M? How many of them got away with it?

Re:Please stop using cyber* (0)

Anonymous Coward | about 9 months ago | (#46420101)

No it doesn't. The act has remaied the same. It's global impact has increased, but that's just because it's easier to iterate the act with computers.

People have been coning others anonymously and across borders ever since we've had technology to enable it; be that horse, post, telegram, tin and string....

Welcome to the New World! (4, Insightful)

blackbeak (1227080) | about 9 months ago | (#46418593)

What consumers around the world need to fully understand (and don't really seem to yet) is that ALL modern data-driven devices represent a new era of consumer product in that each device operates like a two-way mirror. No longer is the product simply yours to use or not. The retail side consumer, no matter what he/she believes they are doing with "their device", are merely entering data points into a vast cyber-machine -- data which numerous others will be collecting, collating, extrapolating, buying, selling, and much, much more. Every "terminal" is equally operable from the other side of the device, most often invisibly to the consumer. This new generation of products actually provides more value to the "other" owner/users (businesses, hackers and government agencies) operating behind the "mirror". Most of these devices could be handed out for free, and yet still provide gigantic profits - sort of like the paper magazine business model. When you have a connected refrigerator other entities will have it too - they just won't be using it to store food. Yet arguably that fridge will be worth more to them than to you!

Re:Welcome to the New World! (0)

Anonymous Coward | about 9 months ago | (#46419723)

Which will lead to slavery through economy.

'Target rich environment' (0)

Anonymous Coward | about 9 months ago | (#46418887)

Is military speak for 'We're heavily outnumbered'

Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?