One of 1st-known Android DDoS malware infects phones in 100 countries

Enlarge (credit: portal gda ) Last year, a series of record-setting attacks hitting sites including KrebsOnSecurity and a French Web host underscored a new threat that had previously gone overlooked: millions of Internet-connected digital video recorders and similar devices that could easily be wrangled into botnets that challenged the resources of even large security services. Now, for one of the first times, researchers are reporting a new platform recently used to wage powerful denial-of-service attacks that were distributed among hundreds of thousands of poorly secured devices: Google’s Android operating system for phones and tablets. The botnet was made up of some 300 apps available in the official Google Play market. Once installed, they surreptitiously conscripted devices into a malicious network that sent junk traffic to certain websites with the goal of causing them to go offline or become unresponsive. At its height, the WireX botnet controlled more than 120,000 IP addresses located in 100 countries. The junk traffic came in the form of HTTP requests that were directed at specific sites, many of which received notes ahead of time warning of the attacks unless operators paid ransoms. By spreading the attacks among so many phones all over the world and hiding them inside common Web requests, the attackers made it hard for the companies that defend against DDoS attacks to initially figure out how they worked. The attacks bombarded targets with as many as 20,000 HTTP requests per second in an attempt to exhaust server resources. Read 8 remaining paragraphs | Comments

Taken from:
One of 1st-known Android DDoS malware infects phones in 100 countries

A second hacking group is targeting bank systems

It’s bad enough that one hacker group has been wreaking havoc on banking systems worldwide, but it’s apparently getting worse. Security firm Symantec reports that a second group, Odinaff, has infected 10 to 20 of its customers with malware that can cover up bogus money transfer requests sent through the ubiquitous SWIFT (Society for Worldwide Interbank Financial Telecommunication) messaging system. Most of the attacks targeted Australia, Hong Kong, the UK, the Ukraine and the US. And unlike the initial attackers, Odinaff appears to be a criminal organization (possibly linked to the infamous Carbanak team) rather than a state-sponsored outfit. Symantec says it’s sharing info about Odinaff with banks, governments and rival security companies. SWIFT itself says that it had warned about the group in the early summer, so there’s a possibility that your bank is relatively prepared to deal with the threat. With that said, the news isn’t exactly comforting. It suggests that hackers still see SWIFT as a prime target, and that your bank’s security is that less certain as a result. Source: Reuters

Taken from:
A second hacking group is targeting bank systems