STE WILLIAMS

DDOS strikes BitCoin exchange Mt.Gox

Bitcoin exchange Mt.Gox has been attacked and its servers briefly taken offline.

The service confirmed the attack at 2:00 AM Japan time on April 22nd, posting a tweet to warn users of the outage.

The Facebook post in the tweet describes the incident as a “Layer 7 Ddos” and promises a statement about the incident “later today”. That statement is yet to materialise, but the site was working at the time of writing. It’s service was reportedly throttled, and users in Bitcoin forums report slow transaction-processing service. Mt.Gox says those queues, which have reached more than 20,000 transactions, can be attributed to limits placed on it by its banks.

Others have devised other theories for the delays, with some hypothesising attacks on Mt.Gox are designed to move the price of Bitcoins in ways that favour the perpetrators.

For its part, Mt.Gox says its recent slow performance is not all due to attacks, with an incident on April 10th be attributed to being a “victim of our own success” as huge numbers of new accounts and high volumes of trades have exceeded the capacity of its systems. The Reg awaits its statement about the DDOS with interest. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/04/22/mtgox_ddos/

DDOS strikes BitCoin exchange Mt.Gox

Bitcoin exchange Mt.Gox has been attacked and its servers briefly taken offline.

The service confirmed the attack at 2:00 AM Japan time on April 22nd, posting a tweet to warn users of the outage.

The Facebook post in the tweet describes the incident as a “Layer 7 Ddos” and promises a statement about the incident “later today”. That statement is yet to materialise, but the site was working at the time of writing. It’s service was reportedly throttled, and users in Bitcoin forums report slow transaction-processing service. Mt.Gox says those queues, which have reached more than 20,000 transactions, can be attributed to limits placed on it by its banks.

Others have devised other theories for the delays, with some hypothesising attacks on Mt.Gox are designed to move the price of Bitcoins in ways that favour the perpetrators.

For its part, Mt.Gox says its recent slow performance is not all due to attacks, with an incident on April 10th be attributed to being a “victim of our own success” as huge numbers of new accounts and high volumes of trades have exceeded the capacity of its systems. The Reg awaits its statement about the DDOS with interest. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/04/22/mtgox_ddos/

Anons torn over naming ‘n’ shaming of 17yo’s gang-rape suspects

Updated Anonymous hacktivists have withdrawn threats to expose the identities of boys accused of gang raping a 17-year-old girl before her death. But rogue Anons may defy the decision and publish the information anyway.

Rehtaeh Parsons, from Dartmouth, Nova Scotia, Canada, was allegedly sexually assaulted while drunk by four lads in November 2011. Sickeningly, one of the gang took photos of the attack, it is claimed.


These images were distributed, it is alleged, and she was tormented by bullies as a result. She reported the rape several days after she said it took place. But Canadian prosecutors decided not to proceed with the case a year later after deciding there was “insufficient evidence”.

Parsons’ mental well-being never fully recovered even after her family moved home, and she suffered from mood swings. She tried to hang herself in her locked family bathroom on 4 April this year, and severely hurt herself before her parents could break down the door. Her life support was switched off days later.

Her family, who have set up a tribute page on Facebook, maintain she never intended to kill herself.

Parsons’ death has provoked questions about the Canadian justice system. Nova Scotia’s Justice Department is reviewing the handling of the case by The Royal Canadian Mounted Police, The Canadian Press reports.

People within the hacking collective Anonymous piled further pressure on these deliberations by threatening to release the names of the suspects unless the authorities act. Although some members of the group have since U-turned on threats to name and shame the suspects, at the request of the family, other Anons have vowed to press on with the threat.

The hacktivists, acting under the hashtag OpJustice4Rehtaeh, denied suggestions they were vigilantes in a statement supplied to Salon:

Our demands are simple: We want the [Nova Scotia Royal Canadian Mounted Police] to take immediate legal action against the individuals in question. We encourage you to act fast. If we were able to locate these boys within 2 hours, it will not be long before someone else finds them.

We do not approve of vigilante justice as the media claims. That would mean we approve of violent actions against these [alleged] rapists at the hands of an unruly mob. What we want is justice. And that’s your job. So do it.

The names of the [alleged] rapists will be kept until it is apparent you have no intention of providing justice to Retaeh’s family. Please be aware that there are other groups of Anons also attempting to uncover this information and they may not to wish to wait at all. Better act fast.

Be aware that we will be organizing large demonstrations outside of your headquarters. The rapists will be held accountable for their actions. You will be held accountable for your failure to act.

Elsewhere more than 115,000 Canadians have put their names down on a petition calling for Nova Scotia’s justice minister to open an independent inquiry into the police investigation in the case.

Rehtaeh Parsons’ funeral is due to take place on Saturday, 13 April. ®

Updated to add

Since the publication of this article, Canadian police decided to reopen the Parsons case following the receipt of “new information”. “The investigators are going to look at that in its entirety, So we’re back in business and we’re going to continue to move forward and see where that information leads us,” said RCMP Cpl Scott MacRae.

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/04/12/anon_pressure_parsons_case/

Ex-LulzSec bloke to spend a YEAR in the cooler for Sony hack

A former LulzSec hacker has been jailed for a year for ransacking Sony Pictures Entertainment’s computer systems.

Cody Kretsinger, 25, from Decatur, Illinois – better known to his fellow LulzSec cohorts as “Recursion” – was also ordered to carry out 1,000 hours of community service, and a year of home detention, following his release from prison.


He was sentenced by a Los Angeles court on Thursday, Reuters reports.

Kretsinger had pleaded guilty to a single count of conspiracy and unauthorized impairment of a protected computer (i.e. computer hacking) in a plea-bargaining agreement. Kretsinger admitting breaking into the Sony Pictures website and extracting information which he passed on to other members of LulzSec, who leaked the data in order to embarrass Sony, a hated enemy of the hacktivist group.

Sony claimed the hack left it $600,000 out of pocket. Kretsinger was ordered to somehow repay this amount in restitution to Sony, the LA Times adds.

Earlier this month a 26-year-old British man also pleaded guilty to computer hacking as part of LulzSec, a splinter group of mischief-makers from the larger Anonymous collective. Ryan Ackroyd, from South Yorkshire, admitted taking part in attacks against numerous high-profile targets including Nintendo, News International, 20th Century Fox, Sony Group and the NHS. Ackroyd adopted the online persona of a 16-year-old girl named Kayla during much of his malfeasance.

Ackroyd and other convicted LulzSec suspects – Jake Davis, 20, (“Topiary”) from the Shetland Islands, Scotland, 18-year-old Mustafa Al-Bassam (“Tflow”), from Peckham, south London and Ryan Cleary, 21, from Wickford, Essex – are all due to be sentenced on 14 May.

Erstwhile LulzSec leader Hector Xavier “Sabu” Monsegur, was revealed in March 2012 as an FBI informer who had been grassing on his former cohorts for 10 months after his arrest in June 2011. Sabu’s sentencing was delayed by 6 months in February due to his “ongoing cooperation with the government”. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/04/19/lulzsec_sony_hack_sentencing/

Malwarebytes declares Windows ‘malicious’, nukes 1,000s of PCs

A dodgy software update for virus-killer Malwarebytes disabled thousands of PCs before a fix was issued this week.

Malwarebytes’ database version v2013.04.15.12 erroneously flagged core Windows system files as malicious, resulting in unstable – and in some cases unbootable – machines. Windows system files were wrongly identified as Trojan-Downloader-ED.


The antivirus firm quickly pulled Monday’s update and issued instructions on how to nurse crippled machines back to health. Despite its prompt response within minutes of the problem flaring up, thousands were still affected. Both consumer and enterprise users of Malwarebytes’ technology were affected.

Marcin Kleczynski, Malwarebytes’ chief exec, apologised for the botched update before later promising improvements in its update process.

From now on, antivirus updates from Malwarebytes will be tested on a virtual server before they are pushed out into the world, we’re told, a move that ought to identify at least more obvious problems.

Malwarebytes is best known for its freebie security scanner software but it branched out last September to target enterprises with a grown-up version of its antivirus tech.

False positives involving antivirus signature updates are a perennial problem that have affected nearly every vendors at one time or another. The consequent problems are most bothersome when they misidentify Windows operating system files as potentially malign and quarantine them, as in the latest case involving Malwarebytes. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/04/19/malwarebytes_false_positive/

Game designer spills beans on chubby-fancying chap with his stolen Mac

A video game designer says he’s planning to cash in on his story of spying on a chubby-fancying pr0n-lover who came into possession of his stolen laptop.

London-based video games designer Stuart, who did not want to give his surname, is looking to monetise his (NSFW) Plumpergeddon blog detailing his surveillance of his Macbook Pro’s new owner.


The computer has been MIA since an incident in October 2011.

All Stuart remembers is waking up on Oxford Street when the sun came up to find his Macbook Pro had gone, along with his credit cards, which were subsequently to used to run up a £7,000 bill.

He decided to track the laptop, using software called Hidden, and then began releasing images and other details of the man who ended up with his missing laptop, whom he christened “Plumpy” after witnessing him sign up for a “plumper pass” at a porn site dedicated to, ahem, larger ladies.

Screencaps from the missing machine revealed the unknown connoisseur’s predilection for the more rotund female form. One of the more lurid pics surged to the top of Reddit with 75,000 hits.

Now, after amassing a dirty dossier of lurid snaps and videos, Stuart says he wants to start making some cash from the blog he started to document the online activities of his laptop’s new possessor.

Stuart said:

“He fucked with the wrong nerd … The more people I can drive through the blog and the slower I can drip-feed tasty morsels of information, the better for me.”

He added: “It makes me feel better about the huge negative effect this experience had on me, such as getting the fear of hearing my bank’s hold music and getting nervous in central London where it happened, particularly with valuables in my bag.”

Stuart originally started his blog after becoming frustrated with the Metropolitan Police’s failure to solve the crime.

After a tense four week wait following the theft, the man who ended up in possession of Stuart’s Macbook accidentally released the lock controls on Hidden, allowing Stuart to begin downloading almost 2GB of screen captures and unwitting selfies of Plumpy, as well as accurate geolocation and Wi-Fi hotspot data.

At first, Plumpy blocked the camera using sellotape. But one day Plumpy decided to remove the tape, revealing him to the full scrutiny of his observer.

“I’m not a religious man but I was praying for the day he’d remove it,” Stuart blogged. “Then one day he had a video chat with a pair of large ladies in bikinis. And the rest, as they say, is history.”

After amassing material at the beginning of last year, Stuart decided to release it into the public domain after becoming angry with the police apparently failing to act on the information he provided them with.

Despite the uncertainty as to exactly how “Plumpy” might have come into possession of the laptop Stuart is unapologetic about the blog, which he now plans to expand with video content of the unwitting subject.

“My plan was always to go public with this if the police failed to act. I don’t feel a connection with him as such but I am at last feeling some closure. And it’s a lot of fun.

“I mailed the Met [police] for a case status update a month ago (and blogged it) to be sure I wasn’t stepping on police toes. The Office of the Information Commissioner was cc’d in their reply but didn’t bother contacting me with any further details. I warned him a year ago I’d go public if they didn’t act, so now I am.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/04/19/laptop_plumpergeddon/

Magic mystery malware menaces many UK machines

Security researchers have found malware that communicates using an unknown protocol and is largely targeting UK businesses.

The mystery software nasty has infected thousands of machines at organisations in finance, education, telecoms and other sectors, we’re told.


It initially phones home to its masters by establishing a HTTP connection to what appear to be a command-and-control server. The malicious software then uses a custom protocol to authenticate itself, and always uses a magic word – literally, some_magic_code1 – at the start of the conversation, according to security researchers at Seculert.

In one instance, the malware contacted the command server for further instructions, and was told to create a new user — username: WINDOWS, password: MyPass1234 — enabling the attacker to remotely log into the infected computer. The malware appears to be in development as new features are being added. Even though Seculert’s researchers have had it under observation for around a month, its true aim remains unclear.

“We have seen several indications of features which are not yet implemented, and functions which are not yet used by the malware,” Seculert staff explained in a blog post. “For instance, in case the attacker would like to open a browser on the victim’s machine, the malware will popup on the RDP session for the attacker a box with the message: ‘TODO:Start browser!’

“This ‘magic malware’ — as we’ve dubbed it — is active, persistent and had remained undetected on the targeted machines for the past 11 months. Since then the attackers were able to target several thousands of different entities, most of them located in the United Kingdom.”

The small and annoying irritant can also steal information and inject malicious HTML into a running web browser, we’re told. However the “real intention of the attackers behind this magic malware … is yet to be known”, according to Seculert.

At present the malware appears to be monitoring the activities of its targeted entities, but since it’s readily capable of downloading and executing additional malicious files it might easily be activated at any time to launch a broader attack.

“This campaign has been active and under the radar for almost a year, targeting mostly UK entities,” Aviv Raff, CTO of Seculert, told The Register. “Also, the malware seems to be still under development by the attackers.”

Raff said that the malware appeared to be largely targeted a business users.

“During our research we have found that this persistent threat infected thousands of machines (mainly from the UK), targeting several different industries– including finance, education and telecoms,” Raff explained. “We have also seen individuals being targeted, but because of the malware capabilities of remote access and hijacking web browsing sessions, we believe that those individuals are employees connecting from remote to corporate assets (e.g. outlook web access).

“The custom protocol of the malware requires a magic code for ‘authentication’. The C2 server will only expose the commands for the infected machine, if the magic code will be provided at the beginning of the custom-protocol request.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/04/18/magic_malware_menaces_uk/

Cyberthugs put YOUR PC to work as Bitcoin-mining SLAVE

The recent volatility in the value of Bitcoins hasn’t prevented cybercriminals from cooking up new ways to distribute malware engineered to mine the currency using compromised computers.

Security researchers at ThreatTrack Security have uncovered examples where the infamous Blackhole exploit kit is being used to distribute a variant of the Fareit information-stealing Trojan onto Windows PCs.


Of course, Fareit has other capabilities besides slurping sensitive information from compromised PCs and sending it back to a remote server. It can also use your computer as a node in a DDoS attack. But some variants also download an additional file onto a compromised PC, save it to a temporary directory, and then execute it, using your PC for its compute power (and hiking up those energy bills). This is the part that interests the Bitcoin baddies. The malware-flingers are using Fareit to surreptitiously install a Bitcoin mining utility.

“Fareit is also known to steal passwords,” explained Chris Boyd, a senior threat researcher at ThreatTrack. “In a lot of cases it drops Rogues (like Winwebsec), search redirectors (like Medfos), and infostealers (like Zbot and Cridex).”

“It’s interesting that in this case, they (the people who configured this variant) decided to drop a [Bitcoin] miner.”

The Blackhole exploit kit is the weapon of choice for running drive-by-download attacks from vulnerable websites. Its application in an attack ultimately designed to distribute rogue Bitcoin mining software is a sign that mining the virtual currency is entering the mainstream of the underground economy, joining rogue antivirus and ad-redirection scams as a way to earn a dishonest living.

ThreatTrack researcher Jovi Umawing said her team had initially found the Blackhole exploit throwing out the Fareit Bitcoin mining attack hosted on a dubious Russian adult website. She said the researchers had been following links from a redirector URL they had been monitoring.

“While malware distributing Bitcoin miners isn’t new, we believe this distribution is fairly new,” Boyd explained. “There have been a couple of recent incidents of malware dropping a rogue miner on systems (a couple weeks ago there was a variant of the Dorkbot worm dropping a miner), highlighting the growing popularity of Bitcoins to criminal groups.”

More details on the attack can be found in ThreatTrack’s blog post, containing screenshots of the attack and more details on the malware, here.

Bitcoin is an online decentralised virtual currency based on an open-source P2P protocol. Cybercrooks have latched onto the popularity of the currency by running digital wallet stealing attacks as well as earlier offensives that mine bitcoins using compromised computers, previously seen using variants of the infamous ZeuS banking Trojan. Cybercrooks have also set up fake sites that pose as Bitcoin currency exchanges in order to run phishing attacks.

A comprehensive run-down of all these forms of malfeasance can be found in a blog post by security tools firm AlienVault here. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/04/18/bitcoin_mining_blackhole/

‘Leccy-stealing, grid-crippling hackers could TAKE DOWN EV-juicing systems

Hack in the Box Hackers may soon starting abusing electric car charger systems to cripple the electricity grid or as part of money-making scams, a security researcher warns.

Ofer Shezaf, product manager security solutions at HP ArcSight, told delegates at the Hack in the Box conference in Amsterdam that if the industry fails to start securing its systems, it will be setting itself up for a major headache a few years down the line.


Both electric cars and EV charging systems are still in their early stages of development and far from widely used. But early systems are hopelessly insecure, the security researcher argues, and if thought isn’t put into designing and applying a secure architecture now, we’ll be dealing with an intractable and expensive problem 10 years down the line – when the technology goes mainstream.

Shezaf’s presentation Who Can Hack a Plug? The Infosec Risks of Charging Electric Cars explains that charging stations are essentially “computer on the street”, featuring embedded RFID readers and connections to other local systems to manage capacity in a local area and avoid overloading the grid.

Shezaf argued that the whole system is weakly authenticated and secured, and might easily be physically tampered with in order to run local denial of service attacks (preventing chargers in an area from working) or to steal either electricity or money. Fortunately the technology exists to thwart such attacks, as an abstract to Shezaf’s talk explains.

The vision of electric cars call for charge stations to perform smart charging as part of a global smart grid. As a result, a charge station is a sophisticated computer that communicates with the electric grid on one side and the car on the other.

To make matters worse, it’s installed outside on street corners and in parking lots. Electric vehicle charging stations bring with them new security challenges that show similar issues as found in SCADA systems, even if they use different technologies.

In this presentation, we will understand what charge stations really are, why they have to be “smart” and the potential risks created to the grid, to the car and most importantly to its owner’s privacy and safety. We will discuss charge station architecture and functionality to identify potential weak spots, and will explore theoretical and real world vulnerabilities in these systems.

In addition subsystems such as the car to charge station protocol, the embedded RFID reader, the electrical circuits and maintenance back doors will also be discussed. Lastly we will talk about potential solutions such as new key provisioning algorithms and limited authorisation schemes.

Shezaf based his research on public sources such as documentation from vendors’ websites, but said hackers could go further – especially if they can physically get hold of equipment, take it apart and look for weaknesses by debugging the software, using fuzzing or other techniques.

He said miscreants could easily dismantle systems, either stolen off the street or purchased through auction sites, to determine its components and extract firmware. This firmware could be analysed and debugged to determine potential vulnerabilities, such as eavesdropping points, or to extract encryption keys (if present). Black hats might also attempt to look at the car/control centre protocol in order to identify vulnerabilities, he said.

Charging stations can be re-configured by opening them up, switching a manual switch into configuration mode, attaching a computer via the Ethenet port found on most charging stations and using it to gain access to the configuration environment. Hackers would find no need to break passwords or other break through other authentication measures to pull off this trick. “You go and open the box with a key and that is the last security measure you meet,” Shezaf said, CSOonline reports.

Physically getting into systems may not even be needed. Some charging stations are outfitted with RS-485 short-range communications networks that are supplied without any in-built security. This opens the door to either eavesdropping and man-in-the-middle attacks.

A town called Malice

These security shortcomings collectively create the risk, small for now but more plausible and with greater impact in future, that hackers could mess with charging stations to the extent they became inoperable, a local denial of service attack. This could be achieved by planting malicious code in all the machines in a town centre that’s programmed to become active at a certain time. Such denial of (charging/power) service attacks could be large-scale or targeted.

“If someone can prevent charging for everyone in a small area you have a major influence on life. In a larger area it might be a really, really big problem,” Shezaf said.

“If somebody finds a way to confuse the smart car charging system, the denial of service can not only hit charging cars, but also the electricity system,” he added.

Open standards for networking and authentication technologies need to be introduced into the industry sooner rather than later, Shezaf concluded.

Shezaf’s complete presentation can be found here (PDF).

Problems in comparable systems have happened before, Shezaf points out. For example, Chicago’s electronic parking meters were thrown into a meltdown for mystery reasons in May 2009.

In another case, a disgruntled former Texas car dealership employee used the internet to disable 100 cars. The vehicles had been equipped with an ignition interrupter that could be controlled over the internet. The Repo Man-style technology was designed to deny the use of cars to customers of the dealership who had fallen behind on their payments but the rogue former employee used passwords assigned to his co-workers in an act of revenge that got him into trouble with the police.

Other possible attacks might include stealing electricity (or money), using man-in-the-middle attacks to emulate control centres, meter spoofing, stealing value from pre-paid charging station cards or other techniques. The possibilities, at least, are extensive and smart meter hacking has been shown to be possible, according to a Black Hat presentation (PDF) dating back to 2009.

And the Boston subway hack (PDF) showed how stored value RFID cards in transport systems could be hacked.

Shezaf’s wake-up call on car-charging systems insecurity is being taken seriously by other industry experts. Lila Kee, chief product and marketing officer of GlobalSign and board member of the North American Energy Standards Board member, however, said that progress is being made towards guarding against the possibility of hackers using electric car chargers to cripple the electric grid.

“While it is important to take security of the critical infrastructure seriously, it is equally important to emphasise the need to establish effective security standards and baselines, otherwise the thousands of interconnected entities making up the grid will be left to guess at how to best protect their respective sections,” said Kee. “We all know that when it comes to cybersecurity, guessing is not much of a strategy. Luckily, we are beginning to see action being taken and progress being made.”

She added: “When it comes to the electric grid, the North American Energy Standards Board (NAESB) has developed standards around the Public Key Infrastructure (PKI) for the energy sector that provides a spectrum of security that balances the cost, operational impact, and security measures needed based on the level of risk of breach.

“As a NAESB board member, I have seen firsthand how standards establishment and legislative intervention can help to improve security private overall. I encourage private industry, government and independent agencies to cooperate to solve cybersecurity problems,” Kee concluded. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/04/18/car_charging_insecurity_exposed/

Black hats attack popular Russian stock-trading software

Security researchers have discovered a strain of malware that targets the QUIK stockbroking application.

The malware has been used in a string of attacks since November 2012, according to Russian security firm Group-IB. Cyber-criminals have traditionally targeted private and corporate banking accounts, using malware (such as variants of the ZeuS cybercrime toolkit) to log key-strokes and extract account information.


Online stock trading and brokerage systems have been hacked in the past but scams have been pulled off using through fake profiles and social engineering scams. More recently trading fraudsters have diversified tactics and begun to use malware.

In particular, professional black hat coders have cooked up a strain of malware targeting specialised trading software called QUIK (Quik Broker, Quik Dealer) from Russian software developers ARQA Technologies and FOCUS IVonline from New York-based EGAR Technology, which is used by many banks in the Russian Federation including Sberbank, Alfa-Bank and Promsvyazbank.

Both of the applications are used for trading on MICEX, a leading Russian stock exchange. MICEX offers services including placing and trading stocks, listing securities, and even the facility to set up initial public offerings (IPOs) or company flotations. Exchange clients trade in stocks and shares issued by the likes of Gazprom, VTB Bank, RusHydro, Mobile TeleSystems, and others.

Andrey Komarov of Group-IB told El Reg that the online trading malware was a variation of the Ranbyus spyware normally used to infect Windows machines and target online banking customers.

“It has quite similar functions to Zeus, as it uses a VNC spawning module which helps the hacker to be connected to the infected PC absolutely remotely and to do fraud silently, that’s why it won’t be detected by anti-fraud filters, as the theft will happen from the same IP address,” Komarov explained.

Another Trojan, Broker-J, also targets QUIK, but uses other techniques, stealing encryption keys from the QUIK storage and transferring them to cybercriminals.

“The end customer should use standard methods of antivirus defence if he runs financial software on a computer which is connected to public networks,” Vladimir Kurlyandchik, head of business development at ARQA Technologies explained. “I mean antivirus software, firewalls etc. It is our standard recommendation.”

“In case of any suspicions of unauthorized  access to an account the end user should immediately initiate procedure of changing access keys. It is also our standard recommendation,” he added.

Kurlyandchik also stated that the QUIK platform incorporates several techniques to prevent unauthorized access, including two factor authentications using either RSA SecureID tokens or SMS messages sent to a pre-registered phone.

“The broker has some tools to monitor suspicious activity and to block access to the system from suspicious IP-addresses, hosts etc,” he said.

You can read an English-language version of the Group-IB researchers’ blog post here. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/04/18/online_broker_malware/