STE WILLIAMS

IRS Reports Steep Decline in Tax-Related ID Theft

Research group Javelin confirms that the numbers are trending in the right direction, with total fraud losses dropping more than 14% to $783 million.

The Internal Revenue Service has reported a significant decrease in tax-related identity theft for the second year in a row, pointing to its Security Summit program with state tax agencies and the tax industry as the reason for the improved numbers.

The Security Summit program, which was formed in 2015 to combat tax-related identity theft, provides multiple behind-the-scenes safeguards to protect taxpayers such as providing security best practices tips and enhancing taxpayer authentication procedures, for example. 

According to the IRS, the agency in 2017 received 242,000 reports from taxpayers that they were victims of tax-related identity theft, compared to 401,000 in 2016 – a drop of nearly 40%.

“These dramatic declines reflect the continuing success of the Security Summit effort,” says Acting IRS Commissioner David Kautter. “This partnership between the IRS, states and tax community is helping protect taxpayers against identity theft. More work remains in this effort, an we look forward to continuing this collaborative effort to fight identity theft and refund fraud.”

Some Progress

Al Pascual, senior vice president, research director and head of fraud and security at Javelin Strategy Research, says that while the IRS has made progress, taxpayers need to understand that criminals are still keeping up the pressure.

Javelin, which tracks and conducts research on identity theft, found that reported incidents of tax-related identity fraud actually increased from 392,000 in 2016 to 425,000 in 2017. Pascual says these are people who told Javelin they were hit with tax-related identity fraud, but might not have necessarily reported it to the IRS.

The good news overall is that the total number of actual refund loss has gone down – as has the average amount, he says. Actual refund loss declined to $783 million in 2017, from $914 million in 2016. And the average individual refund loss dropped a little more than 14% to $1,750 in 2017, down from $2,214 in 2016.

“What’s happened is that there are more cases, but the criminals are getting away with less money,” Pascual says. “Overall, it’s trending in the right direction because the total amount of money stolen has gone down.”

Related Content:

 

 

Black Hat Asia returns to Singapore with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall. Click for information on the conference and to register.

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/irs-reports-steep-decline-in-tax-related-id-theft--/d/d-id/1331077?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

IRS Reports Steep Decline in Tax-Related ID Theft

Research group Javelin confirms that the numbers are trending in the right direction, with total fraud losses dropping more than 14% to $783 million.

The Internal Revenue Service has reported a significant decrease in tax-related identity theft for the second year in a row, pointing to its Security Summit program with state tax agencies and the tax industry as the reason for the improved numbers.

The Security Summit program, which was formed in 2015 to combat tax-related identity theft, provides multiple behind-the-scenes safeguards to protect taxpayers such as providing security best practices tips and enhancing taxpayer authentication procedures, for example. 

According to the IRS, the agency in 2017 received 242,000 reports from taxpayers that they were victims of tax-related identity theft, compared to 401,000 in 2016 – a drop of nearly 40%.

“These dramatic declines reflect the continuing success of the Security Summit effort,” says Acting IRS Commissioner David Kautter. “This partnership between the IRS, states and tax community is helping protect taxpayers against identity theft. More work remains in this effort, an we look forward to continuing this collaborative effort to fight identity theft and refund fraud.”

Some Progress

Al Pascual, senior vice president, research director and head of fraud and security at Javelin Strategy Research, says that while the IRS has made progress, taxpayers need to understand that criminals are still keeping up the pressure.

Javelin, which tracks and conducts research on identity theft, found that reported incidents of tax-related identity fraud actually increased from 392,000 in 2016 to 425,000 in 2017. Pascual says these are people who told Javelin they were hit with tax-related identity fraud, but might not have necessarily reported it to the IRS.

The good news overall is that the total number of actual refund loss has gone down – as has the average amount, he says. Actual refund loss declined to $783 million in 2017, from $914 million in 2016. And the average individual refund loss dropped a little more than 14% to $1,750 in 2017, down from $2,214 in 2016.

“What’s happened is that there are more cases, but the criminals are getting away with less money,” Pascual says. “Overall, it’s trending in the right direction because the total amount of money stolen has gone down.”

Related Content:

 

 

Black Hat Asia returns to Singapore with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall. Click for information on the conference and to register.

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/irs-reports-steep-decline-in-tax-related-id-theft--/d/d-id/1331077?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

White House: Russian Military Behind NotPetya Attacks

The Trump administration today confirmed what UK officials already said today officially: that Russia’s military was behind the crippling NotPetya ransomware campaign aimed at destabilizing Ukraine and that spread to other nations.

In a statement from the White House Press Secretary’s office, the administration said:

“In June 2017, the Russian military launched the most destructive and costly cyber-attack in history.

The attack, dubbed ‘NotPetya,’ quickly spread worldwide, causing billions of dollars in damage across Europe, Asia, and the Americas. It was part of the Kremlin’s ongoing effort to destabilize Ukraine and demonstrates ever more clearly Russia’s involvement in the ongoing conflict. This was also a reckless and indiscriminate cyber-attack that will be met with international consequences.”

NotPetya posed as a ransomware attack, but instead was aimed at destroying data: it modified the Master Boot Record of the infected machine such that the data couldn’t be recovered. Mainly Ukrainian businesses and critical infrastructure providers were hit, but also infected were organizations in Russia, Poland, Denmark, the Netherlands, India, Italy, the UK, Germany, France, Spain, and the US.

Among those hit were Russia’s top oil company Rosneft, Danish shipping giant A.P. Moller-Maersk, Russian metals manufacturer Evraz, Ukraine’s Boryspyl Airport, US pharmaceutical company Merck, and radiation detection systems at Chernobyl.

 

Article source: https://www.darkreading.com/threat-intelligence/white-house-russian-military-behind-notpetya-attacks/d/d-id/1331078?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

White House: Russian Military Behind NotPetya Attacks

The Trump administration today confirmed what UK officials already said today officially: that Russia’s military was behind the crippling NotPetya ransomware campaign aimed at destabilizing Ukraine and that spread to other nations.

In a statement from the White House Press Secretary’s office, the administration said:

“In June 2017, the Russian military launched the most destructive and costly cyber-attack in history.

The attack, dubbed ‘NotPetya,’ quickly spread worldwide, causing billions of dollars in damage across Europe, Asia, and the Americas. It was part of the Kremlin’s ongoing effort to destabilize Ukraine and demonstrates ever more clearly Russia’s involvement in the ongoing conflict. This was also a reckless and indiscriminate cyber-attack that will be met with international consequences.”

NotPetya posed as a ransomware attack, but instead was aimed at destroying data: it modified the Master Boot Record of the infected machine such that the data couldn’t be recovered. Mainly Ukrainian businesses and critical infrastructure providers were hit, but also infected were organizations in Russia, Poland, Denmark, the Netherlands, India, Italy, the UK, Germany, France, Spain, and the US.

Among those hit were Russia’s top oil company Rosneft, Danish shipping giant A.P. Moller-Maersk, Russian metals manufacturer Evraz, Ukraine’s Boryspyl Airport, US pharmaceutical company Merck, and radiation detection systems at Chernobyl.

 

Article source: https://www.darkreading.com/threat-intelligence/white-house-russian-military-behind-notpetya-attacks/d/d-id/1331078?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

White House: Russian Military Behind NotPetya Attacks

The Trump administration today confirmed what UK officials already said today officially: that Russia’s military was behind the crippling NotPetya ransomware campaign aimed at destabilizing Ukraine and that spread to other nations.

In a statement from the White House Press Secretary’s office, the administration said:

“In June 2017, the Russian military launched the most destructive and costly cyber-attack in history.

The attack, dubbed ‘NotPetya,’ quickly spread worldwide, causing billions of dollars in damage across Europe, Asia, and the Americas. It was part of the Kremlin’s ongoing effort to destabilize Ukraine and demonstrates ever more clearly Russia’s involvement in the ongoing conflict. This was also a reckless and indiscriminate cyber-attack that will be met with international consequences.”

NotPetya posed as a ransomware attack, but instead was aimed at destroying data: it modified the Master Boot Record of the infected machine such that the data couldn’t be recovered. Mainly Ukrainian businesses and critical infrastructure providers were hit, but also infected were organizations in Russia, Poland, Denmark, the Netherlands, India, Italy, the UK, Germany, France, Spain, and the US.

Among those hit were Russia’s top oil company Rosneft, Danish shipping giant A.P. Moller-Maersk, Russian metals manufacturer Evraz, Ukraine’s Boryspyl Airport, US pharmaceutical company Merck, and radiation detection systems at Chernobyl.

 

Article source: https://www.darkreading.com/threat-intelligence/white-house-russian-military-behind-notpetya-attacks/d/d-id/1331078?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Cybercrime Gang Ramps up Ransomware Campaign

In the last few weeks, Gold Lowell group has collected over $350K after infecting victims with SamSam crypto malware, researchers at Secureworks found.

A cybercrime gang known as Gold Lowell has been using scan-and-exploit tactics to opportunistically infect business networks with ransomware and extort money from the victim organizations.

The group – which has been around since at least 2015 – appears to have ramped up activity in the last few weeks in keeping with its previous pattern of escalating attacks during the end part through the beginning of the calendar year, Secureworks said in a report this week.

Between late December and mid-January alone, Gold Lowell managed to collect at least $350,000 in extortion money after infecting victims with a custom version of SamSam, a previously known ransomware tool. The group’s victims include healthcare organizations, IT software providers, transportation companies, waste management firms, and business services organizations. Many of them have been small- to midsized organizations.

From a malware perspective itself, SamSam is little different from the slew of ransomware tools floating about in the wild currently. The tactic Gold Lowell has been using to install the malware on victim systems and networks is notable, however, notes Matthew Webster, senior security researcher at Secureworks’ Counter Threat Unit.

“SamSam ransomware is essentially as sophisticated as it needs to be,” Webster says. “The main contrast between other ransomware capabilities is how it is deployed—after compromise of the victim’s systems and account credentials.”

According to Secureworks, Gold Lowell has shown a tendency to scan Internet-facing systems for known vulnerabilities and exploits. The group’s scanning has targeted systems and protocols like JBoss and RDP that are more likely to be used by organizations than by individuals. Early on, the threat group regularly targeted JBoss applications using an open source exploitation tool. In 2017, Gold Lowell began targeting legitimate Remote Desktop Protocol (RDP) account credentials—often via brute force attacks, Secureworks said.

Once it gains at initial foothold on a network, Gold Lowell has shown a tendency to use both publicly available and proprietary tools and exploits in order to escalate privileges and find the most central and critical systems to exploit.

“[SamSam’s] encryption methodology is strong and it carries out actions that make it more difficult for recovery and investigation,” Webster says. Measures include wiping additional space on the disk and deleting itself, he says.

Gold Lowell typically demands a ransom of around $9,500 for decrypting files. But based on how effective the group has been at deploying SamSam inside breached networks, it is quite likely that some victims are paying up a lot more, according to Webster. In one campaign during mid-2017 that Secureworks researchers observed, the value of the ransom for decrypting the entire network of the victim organization was 28 bitcoins, or approximately $68,000 at the time, he says.

In at least one instance the threat actors doubled the decryption cost after a victim’s initial payment barely missed the deadline set for it. “The doubling of the ransom really goes to highlight that once the decision has been made to pay the ransom, then as victim you are handing control over to the adversary,” Webster says. Such incidents highlight the importance for organizations to have a well-tested data backup and incident response process in place, he notes.

Gold Lowell, however, generally takes steps to instill confidence that the victim will get their data back once payment has been received. It offers to decrypt files as a test, for instance, and advice on purchasing bitcoin and how to set up bitcoin wallet.

“Long-term ransomware campaigns only work if the victim is confident that they will get their data back, and the SamSam actors clearly take steps to instill that confidence,” Webster says.

Related Content:

 

 

Black Hat Asia returns to Singapore with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/cybercrime-gang-ramps-up-ransomware-campaign/d/d-id/1331079?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Cybercrime Gang Ramps up Ransomware Campaign

In the last few weeks, Gold Lowell group has collected over $350K after infecting victims with SamSam crypto malware, researchers at Secureworks found.

A cybercrime gang known as Gold Lowell has been using scan-and-exploit tactics to opportunistically infect business networks with ransomware and extort money from the victim organizations.

The group – which has been around since at least 2015 – appears to have ramped up activity in the last few weeks in keeping with its previous pattern of escalating attacks during the end part through the beginning of the calendar year, Secureworks said in a report this week.

Between late December and mid-January alone, Gold Lowell managed to collect at least $350,000 in extortion money after infecting victims with a custom version of SamSam, a previously known ransomware tool. The group’s victims include healthcare organizations, IT software providers, transportation companies, waste management firms, and business services organizations. Many of them have been small- to midsized organizations.

From a malware perspective itself, SamSam is little different from the slew of ransomware tools floating about in the wild currently. The tactic Gold Lowell has been using to install the malware on victim systems and networks is notable, however, notes Matthew Webster, senior security researcher at Secureworks’ Counter Threat Unit.

“SamSam ransomware is essentially as sophisticated as it needs to be,” Webster says. “The main contrast between other ransomware capabilities is how it is deployed—after compromise of the victim’s systems and account credentials.”

According to Secureworks, Gold Lowell has shown a tendency to scan Internet-facing systems for known vulnerabilities and exploits. The group’s scanning has targeted systems and protocols like JBoss and RDP that are more likely to be used by organizations than by individuals. Early on, the threat group regularly targeted JBoss applications using an open source exploitation tool. In 2017, Gold Lowell began targeting legitimate Remote Desktop Protocol (RDP) account credentials—often via brute force attacks, Secureworks said.

Once it gains at initial foothold on a network, Gold Lowell has shown a tendency to use both publicly available and proprietary tools and exploits in order to escalate privileges and find the most central and critical systems to exploit.

“[SamSam’s] encryption methodology is strong and it carries out actions that make it more difficult for recovery and investigation,” Webster says. Measures include wiping additional space on the disk and deleting itself, he says.

Gold Lowell typically demands a ransom of around $9,500 for decrypting files. But based on how effective the group has been at deploying SamSam inside breached networks, it is quite likely that some victims are paying up a lot more, according to Webster. In one campaign during mid-2017 that Secureworks researchers observed, the value of the ransom for decrypting the entire network of the victim organization was 28 bitcoins, or approximately $68,000 at the time, he says.

In at least one instance the threat actors doubled the decryption cost after a victim’s initial payment barely missed the deadline set for it. “The doubling of the ransom really goes to highlight that once the decision has been made to pay the ransom, then as victim you are handing control over to the adversary,” Webster says. Such incidents highlight the importance for organizations to have a well-tested data backup and incident response process in place, he notes.

Gold Lowell, however, generally takes steps to instill confidence that the victim will get their data back once payment has been received. It offers to decrypt files as a test, for instance, and advice on purchasing bitcoin and how to set up bitcoin wallet.

“Long-term ransomware campaigns only work if the victim is confident that they will get their data back, and the SamSam actors clearly take steps to instill that confidence,” Webster says.

Related Content:

 

 

Black Hat Asia returns to Singapore with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/cybercrime-gang-ramps-up-ransomware-campaign/d/d-id/1331079?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Cybercrime Gang Ramps up Ransomware Campaign

In the last few weeks, Gold Lowell group has collected over $350K after infecting victims with SamSam crypto malware, researchers at Secureworks found.

A cybercrime gang known as Gold Lowell has been using scan-and-exploit tactics to opportunistically infect business networks with ransomware and extort money from the victim organizations.

The group – which has been around since at least 2015 – appears to have ramped up activity in the last few weeks in keeping with its previous pattern of escalating attacks during the end part through the beginning of the calendar year, Secureworks said in a report this week.

Between late December and mid-January alone, Gold Lowell managed to collect at least $350,000 in extortion money after infecting victims with a custom version of SamSam, a previously known ransomware tool. The group’s victims include healthcare organizations, IT software providers, transportation companies, waste management firms, and business services organizations. Many of them have been small- to midsized organizations.

From a malware perspective itself, SamSam is little different from the slew of ransomware tools floating about in the wild currently. The tactic Gold Lowell has been using to install the malware on victim systems and networks is notable, however, notes Matthew Webster, senior security researcher at Secureworks’ Counter Threat Unit.

“SamSam ransomware is essentially as sophisticated as it needs to be,” Webster says. “The main contrast between other ransomware capabilities is how it is deployed—after compromise of the victim’s systems and account credentials.”

According to Secureworks, Gold Lowell has shown a tendency to scan Internet-facing systems for known vulnerabilities and exploits. The group’s scanning has targeted systems and protocols like JBoss and RDP that are more likely to be used by organizations than by individuals. Early on, the threat group regularly targeted JBoss applications using an open source exploitation tool. In 2017, Gold Lowell began targeting legitimate Remote Desktop Protocol (RDP) account credentials—often via brute force attacks, Secureworks said.

Once it gains at initial foothold on a network, Gold Lowell has shown a tendency to use both publicly available and proprietary tools and exploits in order to escalate privileges and find the most central and critical systems to exploit.

“[SamSam’s] encryption methodology is strong and it carries out actions that make it more difficult for recovery and investigation,” Webster says. Measures include wiping additional space on the disk and deleting itself, he says.

Gold Lowell typically demands a ransom of around $9,500 for decrypting files. But based on how effective the group has been at deploying SamSam inside breached networks, it is quite likely that some victims are paying up a lot more, according to Webster. In one campaign during mid-2017 that Secureworks researchers observed, the value of the ransom for decrypting the entire network of the victim organization was 28 bitcoins, or approximately $68,000 at the time, he says.

In at least one instance the threat actors doubled the decryption cost after a victim’s initial payment barely missed the deadline set for it. “The doubling of the ransom really goes to highlight that once the decision has been made to pay the ransom, then as victim you are handing control over to the adversary,” Webster says. Such incidents highlight the importance for organizations to have a well-tested data backup and incident response process in place, he notes.

Gold Lowell, however, generally takes steps to instill confidence that the victim will get their data back once payment has been received. It offers to decrypt files as a test, for instance, and advice on purchasing bitcoin and how to set up bitcoin wallet.

“Long-term ransomware campaigns only work if the victim is confident that they will get their data back, and the SamSam actors clearly take steps to instill that confidence,” Webster says.

Related Content:

 

 

Black Hat Asia returns to Singapore with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/cybercrime-gang-ramps-up-ransomware-campaign/d/d-id/1331079?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Coinmining frenzy is making it hard for us to find aliens

Forget Iceland’s energy getting sucked up by cryptocoin miners. We can’t find the aliens!

You need a few things to mine cryptocurrency, or to do a bunch of other things, including build a gaming PC from scratch, run radio-astronomy operations, or search the skies for incoming messages from extraterrestrials.

The things you need include a whole lot of preferably renewable energy (thanks, Iceland!). It’s also helpful to have access to data centers and a nice, chilly environment to help with cooling them (thanks again, Iceland!).

You also need a pile of graphics processing units (GPUs): the high-end computer chips from manufacturers like AMD or Nvidia that miners use to build their mining machines.

Unfortunately for gamers, radio astronomers and Search for Extraterrestrial Intelligence (Seti) researchers, the prices on GPUs have been going nuts for a few months. At the end of January, when cryptocurrency values had soared, they dragged GPU costs right on up with them.

Gaming news site Polygon last month reported these then-current examples of GPU prices:

The cheapest price for MSI’s GeForce GTX 1070 Gaming X (MSRP $459.99) is $945.99 on Amazon and $988.99 on Newegg; it’s not much lower at Micro Center, which has it listed at $919.99.

And that’s when you can get the GPUs at all.

At least one retailer, Micro Center, is keeping the supply lines open for its core customers (gamers), reduces the prices for those building gaming rigs, and is limiting GPU quantities to others, including both cryptocurrency miners and apparently Seti and other researchers. Here’s a letter Micro Center posted to its “Valued Build Customers” about the policies.

Likewise, Nvidia has advised retailers to make arrangements to make sure that they’re prioritizing gamers over miners.

Where does that leave the search for intelligent extraterrestrial life? Sadly GPU-starved.

Dan Werthimer, chief scientist at the Berkeley Seti Research Center, told the BBC that the center would like to use the latest GPUs. It has the money, but it just can’t get them.

This is a new problem. It’s only happened on orders we’ve been trying to make in the last couple of months… That’s limiting our search for extraterrestrials, to try to answer the question, ‘Are we alone? Is there anybody out there?’

At some telescopes, Berkeley Seti has around 100 GPUs crunching data from large listening arrays, he told the BBC. The arrays can pick up the faintest whispers of radio frequencies coming into the solar system from elsewhere in the universe, including from natural phenomena such as collapsing stars.

If Seti could get the GPUs, they could use them to improve their ability to analyze data at two observatories: Green Bank in West Virginia and Parkes in Australia.

It’s looking like the only thing that could possibly make that goal achievable is for cryptocoin values to crash, and to drag down the cost of GPUs with them.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/mLYZSNvqkmc/

Essex black hat behind Cryptex and reFUD gets two years behind bars

A 24-year-old Essex man behind the reFUD.me antivirus evasion site, who made an estimated half a million pounds from Bitcoin, has been jailed for two years.

Goncalo Esteves, of Cape Close, Colchester, England, admitted two computer misuse offences and one charge of money laundering in January. He was sentenced today at Blackfriars Crown Court.

His main illegal business was operating reFUD.me (the FUD stands for Fully UnDetectable), which let black hats test their wares against antivirus software without uploading alerts to antivirus vendors and anti-malware researchers. The site ran between October 2011 and November 2015.

Esteves, who used the handle KillaMuvz, also had a profitable sideline in selling licences for his Cryptex program, which scrambles malware binaries in order to help black hats get their malicious payloads onto target devices without detection. A month of Cryptex Lite cost £5, or customers could buy a lifetime licence for £60.

Through his illicit online sales, Esteves earned £32,000 on Paypal alone, while prosecutors estimated that, at its height, his Bitcoin holdings were worth £500,000. Thanks to the recent crash in price, it was thought to be worth just £15,700 when he pleaded guilty on 15 January.

“The Bitcoin wallet was investigated and the National Crime Agency saw that there were numerous transfers in of Bitcoin and transfers out,” said Crown barrister John Ojakovoh. “Unfortunately it is, of course, not possible to trace where those land.”

The court heard how Esteves also sold a remote-access trojan (RAT) to a Skype user with the handle FishHabbo who wanted it installed on his ex-girlfriend’s computer to “see what she’s up to”.

Ojakovoh told the court: “In fairness to the defendant he at first said, ‘Instead of hacking her, how about you do something really nice for her?’ But the customer persisted so the defendant sold him the product, knowing it was going to be used to spy on or stalk his ex-girlfriend.”

Although Esteves claimed that his online business was legitimate, Ojakovoh told the court that his sales of RATs were “like offering to disconnect burglar alarms so that burglars can get in undetected”.

The malware vendor was caught after a joint investigation by security firm Trend Micro and the National Crime Agency. A police raid on his house in November 2015 netted him and one other individual who the NCA confirmed was “NFA’d” (no further action) in “early 2016”.

He was handed a seven-month suspended sentence at Reading Crown Court in August 2016 for making false claims for refunds on four Macbooks ordered on Amazon. One of the computers was used in his illegal business and was seized by police when they raided his home in 2015, as the Central News court reporting agency wrote.

Circuit Judge Mark Dennis QC told Esteves, who appeared in court accompanied by his pregnant wife and father-in-law: “Disguising viruses and malware has the potential to cause significant harm to an individual. The defendant appears to have believed that his specialised crime would enable him to carry out these offences with impunity.”

The malware peddler “clutched his tie with both hands and sobbed as he was jailed for a total of two years”. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/02/15/refud_cryptex_kingpin_goncalo_esteves_jailed/