Karbonn Titanium Mach One
Sennheiser Momentum In-Ear headphones review
Tonino Lamborghini 88 Tauri
Sigma DP2 Quattro digital camera
Creative MUVO mini
First Impressions: Lenovo Yoga 3 Pro
An overview of Digiflip Pro tablets
App of the Week: Frankly.Me
Don Bosco Institute of Technology hosts Teknack, an online tech fest
Why Sony is exiting smartphone business
Don't read this, lest you get offended!
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Google withdraws ban on 'explicit' adult content on Blogger
Karbonn Titanium Dazzle smartphone launched at Rs 5,490
The new Blackberry Classic does not have a camera, costs $400
Google may separate Hangouts and Photos from Google+
Moto E second gen 3G version to launch at Rs. 6999
Videocon VAB163 150 L Single Door Refrigerator
Videocon VA163B 150 L Single Door Refrigerator
Electrolux REF ECL093SH-FDW 80 L Single Door Refrigerator
Electrolux EBP203 190 L Single Door Refrigerator
Electrolux REF EBP163SM-FDA 150 L Single Door Refrigerator
How to use Intel XDK plugins for Sublime Text
Intel XDK Update - HTML5 Games, Sublime Text* & Easier to Get Started
Steps to add x86 support to Android Apps Using Unity
3 easy steps for maximum performance for your Android emulator (Intel HAXM)
How does your GPU affect your image blur algorithms
Fly Snap Smartphone First Impression
Fly Qik+ Smartphone: First Impression
Lenovo Yoga 3 Pro Ultrabook
Wowsome Augmented Reality mobile app
15 top displays in tech products today
10 smartphones launched so far in Feb 2015
At a glance: Digiflip Pro range of tablets from Flipkart
Moto E (2015): An Overview
Best FPS games for mobile phones
Intel Developer Zone
Intel Windows Developer Zone
Dsk International Campus Zone
ESET claims in 2012 it had uncovered a Trojan malware that steals login details of Facebook users, called PokerAgent. The Trojan botnet also collected associated credit card information. Check out the security research firm’s full report, below:
ESET, the leader in proactive protection against Internet threats, discovered the ‘PokerAgent’ botnet that was designed to harvest Facebook log-on credentials, collecting information on credit card details linked to the Facebook account and popular Zynga Poker player stats, presumably with the intention to mug the victims. The Trojan managed to steal the login credentials of more than 16,000 Facebook users in 2012.
ESET Security Research Lab has discovered an attention-grabbing Trojan horse about a year ago. ESET has been detecting the different variants of the Trojan generically as MSIL/Agent.NKY. The malware focused on stealing personal Facebook (FB) login details and linking these with the user statistics of Texas HoldEm Poker, a very popular FB application by Zynga Inc., in case the victim plays this game.
According to data from ESET LiveGrid, a cloud powered real-time protection scanner, precisely 99% of all detections of Trojan were coming from Israel. ESET has contacted Israeli CERT (Computer Emergency Response Team) as well as Israeli police in early 2012. During the investigation ESET could not provide any details about this threat publicly and presently this threat has been deactivated.
Zynga Poker is a famous app available on all popular platforms: Zynga.com, iPhone, Facebook, iPad, Android. According to AppData, the application has a monthly share of 35 million active users. Zynga Poker on Facebook is considered to be the most popular online poker platform in India. While analyzing this botnet ESET estimates that the attacker could gain access to a total of 16,194 login credentials.
What was the actual scenario of the attack?The attacker used the Trojan to gain the user’s FB login credentials, his/her score in Texas HoldEm Poker game, as well as information on the amount of credit cards stored in his/her Facebook settings and available to increase the credit in the game of poker.
The game had a functionality that allowed replenishing the chip value using real money by inputting the credit card details or PayPal account. To gain the user’s login credentials, an army of 800 of computers were used – all infected and controlled by the attacker. These machines were executing commands from the C&C (Command&Control) server. The creator of the threat has launched an attack using the login credentials of several FB accounts, which were gained ahead of time.
The infected computers received a command to login into the user’s FB accounts and to gain the user’s Texas HoldEm score, as well as the amount of credit cards stored in his/her FB account. In case of a user w/o a credit card or low score, the infected computer received instructions to infect the victim’s FB profile with a link to a phishing site. This site has acted to directly or indirectly lure the player’s FB friends to a website resembling the FB homepage. In case the login credentials were input by them, they were also harvested by the attacker.
“Analyzing the attack flow, I can say users should be more careful and, initially, more educated. While noticing that Facebook login page is fake may not be possible all the times, especially if the bad guys had designed it well, storing your payment credentials, credit card or PayPal account details into any app on Facebook, smartphone or elsewhere can and should be avoided. Not only Texas HoldEm Poker, but any other Facebook application could have been infected in the same way”, says Pankaj Jain, Director at ESET India.
The number of threats utilizing Facebook is rapidly growing. To counter this trend, ESET has introduced a security application ESET Social Media Scannerwhich is available free of charge and is capable of scanning the user’s profile for the presence of malicious and phishing links. On top of that, the app can detect malicious links on the timeline of user’s Facebook friends.
Read more about ‘PokerAgent’ discovery in a dedicated blog post: http://blog.eset.com/2013/01/29/pokeragent-stealing-over-16000-facebook-credentials
ESET White Paper on ‘PokerAgent’ botnet available here: http://www.esetindia.com/.newsletters/pokeragent_WP.pdf