Citizens First Cyber Security Professionals




Not a member yet?
Click here to register.

Forgotten your password?
Request a new one here.

Connect via Facebook

Connect via Facebook

Member Poll

There are no polls defined.


You must login to post a message.

16-01-2018 11:17
Yo' ... It's beginning to look like I have hired another lazy ass moderator?... That best not be the case!! Frown

12-01-2018 12:30
Yo' Citizens, I will have a couple of "new tools" and some interesting news to share with you today! I will have it all up for you shortly. Cool

01-01-2018 15:56
Yo' Citizens, Happy New Year! Grin

24-12-2017 13:40
Yo' Citizens, Merry Christmas Eve! Grin

16-12-2017 18:54
Currently creating your holiday specials! New holiday membership specials coming to you within the hour! Grin

Welcome Citizens

Welcome to, Citizens First Cyber Security Professionals.

The Individual Citizen Specific, Cyber Security Investigative Services Firm. Cyber Security Web Forum and Educational Cyber Security Dojo.

Geared strictly to helping Individual Citizens and Small Businesses! Address unwanted cyber security intrusions and hacking incidents!

View Thread

 Print Thread
New mobile Trojan Loapi mines cryptocurrency, performs DDos attacks - Via - VentureCanvas
Yo' Greetings Citizens,

New mobile Trojan Loapi mines cryptocurrency, performs DDos attacks - Via - VentureCanvas

Kaspersky Lab researchers have identified a new intriguing malware with multiple modules, which allows for an almost endless number of malicious features – from cryptocurrency mining to DDoS attacks. Due to its modular architecture, even more, functions can be added to it. This unusual and powerful malicious software is called Loapi.

Loapi stands out from the crowd of various single-functional Android malware, including banking Trojans, crypto mining Trojans, etc., because it has a complex modular architecture that allows it to perform almost limitless actions on a compromised device.

The Loapi Trojan is being spread through advertising campaigns under the guise of antivirus solutions or apps for adults. Once installed, applications request device admin rights and then discreetly initiate communications with command and control servers to install additional modules.

The architecture includes the following modules:

Adware module
– used for the aggressive display of advertising on the user’s device,

SMS module – used by the malware to perform various operations with text messages,

Web crawler module – used to subscribe users to paid services without them knowing. The SMS-module will hide messages from the user, respond to them as needed, and then remove all the “evidence”.

Proxy module – allows attackers to execute HTTP requests on behalf of the device. These actions can be performed for DDoS attacks,

Monero miner module – used to mine the cryptocurrency Monero (XMR).

As well as its excessive volume of features, Loapi has the capacity to protect itself. As soon as a user tries to revoke device admin rights, the malware blocks the device’s screen and closes the window. In addition to this standard protection technique, Loapi can receive a list of applications that are dangerous to it from the command and control servers – these are often security solutions, which intend to remove the malware. If an installed or running application is on the list, the Trojan shows users a fake message saying the malicious software has been found and offering users the chance to remove the application. The message is shown in a loop, thus, even if the user refuses to delete the app at first, the message will be displayed again and again until the user finally agrees.

Besides the Loapi approach to self-defence, Kaspersky Lab research has also found an interesting twist: tests on one randomly selected mobile phone demonstrated that the malware creates such a heavy workload on an infected device, that it even heats it up, and can deform its battery. Apparently, the malware’s authors hardly wanted this to happen, as they are hungry for as much money as they can get by keeping the malware running. But their lack of attention to the malware’s optimisation has led to this unexpected physical “attack vector” and possibly serious damage to user devices...++...

Please Read The Full Story here: http://www.ventur...urecanvas/

Thank You For Your Time, Citizens. I hope that you have a great and cyber-secure day!

Thank You Citizen,
The Administration
Jump to Forum:
top image scrolling tools
Render time: 0.19 seconds
311,952 unique visits