Over the past five months, a hacker group has gained access to more than 5,000 phones and data of at least 2,500 bank cards
. Employees of the K department of the BSMT Ministry of Internal Affairs in the Chuvash Republic detained the organizers of a criminal group that was stealing money from clients of Russian banks using the FakeToken malicious software. The group has been operating for more than 5 years, the damage from its activities exceeds 20 million rubles, "Bi.Zone reported.
"During a search at the addresses of residence of one of the fraudsters, network devices, communication devices and computer equipment containing clear traces of the development and distribution of Trojan Banker.AndroidOS.FakeToken were found and seized. Also, employees of the Ministry of Internal Affairs found SIM cards of various communication operators and electronic correspondence in Telegram, which confirms the involvement of the detainee in illegal activities. "
According to experts, the attackers used Trojan Banker.AndroidOS.FakeToken malware to steal money from users of Android mobile devices. The program infected devices, intercepted SMS messages from the bank and transmitted them to the server of criminals, and also collected bank card data. The scammers used this information to transfer money from the victims' mobile and bank accounts. "Over the past five months, the hacker group has gained access to more than 5,000 phones and the data of at least 2,500 bank cards," the company said.
The FakeToken banking Trojan has been known since 2016. It is capable of attacking over 2 thousand financial applications; about 16 thousand users in 27 countries, including Russia, Ukraine and Germany, have become its victims.
In 2017, two hackers were sentenced in Chuvashia on charges of distributing malware in order to obtain material gain. Cybercriminals infected over 1,100 devices with malware. As established by the investigation, a 30-year-old resident of the republic and his 28-year-old accomplice injected malicious programs on devices designed for hidden remote control of the infected system with the ability to copy passwords, as well as details for electronic payments. The defendants intended to sell the received passwords and codes via the Internet, but did not manage to do this.
__________________
. Employees of the K department of the BSMT Ministry of Internal Affairs in the Chuvash Republic detained the organizers of a criminal group that was stealing money from clients of Russian banks using the FakeToken malicious software. The group has been operating for more than 5 years, the damage from its activities exceeds 20 million rubles, "Bi.Zone reported.
"During a search at the addresses of residence of one of the fraudsters, network devices, communication devices and computer equipment containing clear traces of the development and distribution of Trojan Banker.AndroidOS.FakeToken were found and seized. Also, employees of the Ministry of Internal Affairs found SIM cards of various communication operators and electronic correspondence in Telegram, which confirms the involvement of the detainee in illegal activities. "
According to experts, the attackers used Trojan Banker.AndroidOS.FakeToken malware to steal money from users of Android mobile devices. The program infected devices, intercepted SMS messages from the bank and transmitted them to the server of criminals, and also collected bank card data. The scammers used this information to transfer money from the victims' mobile and bank accounts. "Over the past five months, the hacker group has gained access to more than 5,000 phones and the data of at least 2,500 bank cards," the company said.
The FakeToken banking Trojan has been known since 2016. It is capable of attacking over 2 thousand financial applications; about 16 thousand users in 27 countries, including Russia, Ukraine and Germany, have become its victims.
In 2017, two hackers were sentenced in Chuvashia on charges of distributing malware in order to obtain material gain. Cybercriminals infected over 1,100 devices with malware. As established by the investigation, a 30-year-old resident of the republic and his 28-year-old accomplice injected malicious programs on devices designed for hidden remote control of the infected system with the ability to copy passwords, as well as details for electronic payments. The defendants intended to sell the received passwords and codes via the Internet, but did not manage to do this.
__________________