YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

Kaspersky: Porn Ransomware Now Targets PCs and Mobiles

Posted On 11 Aug 2014
By : admin

WOBURN, Mass. – A piece of malware thought effectively eradicated in July has returned even nastier than before, according to antivirus researchers at Kaspersky Lab.

The Koler ‘police’ ransomware, which originally targeted only mobile devices running the Android operating system, now also uses a previously hidden mechanism to infect desktop PCs running Windows. Introduced in April, the virus drops a browser-based ransom note and an exploit kit when end-users visit any of at least 48 malicious porn websites operated by Koler’s developers.

The malware became ineffective in late July when researchers located the command-and-control server and deactivated the delivery mechanism. Three days later, the cyber-criminals behind the attacks activated the previously hidden mechanism which employs and unusual scheme to scan victims’ systems and offer customized ransomware depending on location and device type. Like in the original scenario, as soon as the malware has downloaded, a message pops up on the user’s screen claiming the victim has accessed illegal pornography and must pay a fine of $100 to $300 in order to unlock the device.

The use of a pornographic network is no coincidence: Victims are more likely to feel guilty about browsing such content and pay the alleged fine demanded by the local “authorities.”

The ransomware selects one of several operating scenarios determined by criteria including geographical location, device configuration and installed software. Originally, Koler activated only when users intentionally downloaded and installed a mobile app called animalporn.apk. In its current incarnation, Koler uses a “drive-by” mechanism to install its payload on Windows-based PCs via any browser except Internet Explorer. The payload isn’t entirely effective, as the ransom screen is easily evaded by pressing alt+F4.

The scenario is scarier for users who run Internet Explorer. Via automatic browser redirect, Koler installs the Angler Exploit Kit, which invades Silverlight, Adobe Flash and Java. Kaspersky researchers said the exploit is fully functional but as yet delivers no payload; however, they expect Koler’s developers to activate a payload in the very near future.

“Of most interest is the distribution network used in the campaign,” Kaspersky Principal Security Researcher Vicente Diaz said. “Dozens of automatically generated websites redirect traffic to a central hub using a traffic distribution system where users are redirected again. We believe this infrastructure demonstrates just how well organized and dangerous this campaign is. The attackers can quickly create similar infrastructure thanks to full automation, changing the payload or targeting different users. The attackers have also thought up a number of ways of monetizing their campaign in a truly multi-device scheme.”

Although Koler localizes in more than 30 countries, users in the U.S. compose the vast majority of the victims. Of the 200,000 visitors to the mobile infection domain since Koler’s appearance, 80 percent are U.S. based. Another 6.8 percent are located in the UK, followed by 3 percent in Australia, 2.8 percent in Canada, 1 percent in Saudi Arabia and 0.6 percent in Germany.

More Koler information and statistics are available on Kaspersky’s SecureList blog.

  • google-share
Previous Story

VOD-only Titles Eligible for 2015 AVN Awards

Next Story

YNOT Awards 2014 Voting Opens

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • RIVCash
    Live Cam Affiliate Programs
  • Cheapest Adult Scripts
    Software & Scripts
  • Web Template Zone
    Web Design & Templates
  • Premiere Listing

    iWantClips

    More Details

RECENT

POPULAR

COMMENTS

ChickPass Amateurs Drops Two "Try-A-Dick" Scenes with Karma Blay

Posted On 06 Jun 2025

Parker Savage Makes His See Him Fuck Debut

Posted On 06 Jun 2025

Erika Icon Scores June Cover of ASN Mag & Feature

Posted On 06 Jun 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Sex Toy Collective Dildo Sculptor

Posted On 19 Mar 2019

Find a good sex toy is now a problem,...

Posted On 18 Mar 2024

Thanks to the variety of sex toys, I can...

Posted On 02 Feb 2024

I understand the concerns about...

Posted On 05 Jan 2024

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy