cp.gifCatching the most momentum in May, a Malware attack by the name of MacDefender, was spreading throughout the Mac community. It’s method of attack, was to trick less technically-savvy users into installing the malicious software by claiming to be an application needed to stop an attack. Instead of course, it is the attack, and after a user enter’s their credit card number and clicking OK to “remove the virus”, it was granted access to do it’s evil work. It all boiled down to a phishing scam for credit card numbers.

The situation soon ballooned into a tit-for-tat ballet between Apple and the MacDefender makers, one creating a patch to fix the problem, the other releasing a new variant to eschew the fix. Then suddenly it all stopped around June 18th, which is the last day Apple updated their patch to stop MacDefender.

Brian Krebs of KrebsonSecurity.com, suspects that the arrest of Pavel Vrublevsky the co-founder of ChronoPay, an online payment company known to be affiliated with the fake AntiVirus software market, had something to do with MacDefender’s disappearance. Vrublevsky’s arrest took place on June 23rd, just five days after the latest MacDefender variant was released on June 18th.

Krebs points to another report he wrote in May, wherein he showed evidence suggesting ChronoPay employees were involved, in some fashion, with the MacDefender attacks. ChronoPay later issued a statement denying any involvement. However, after the June 23rd police raids of ChronoPay’s offices in Moscow, evidence has come to light which suggested that the company was very much involved in the MacDefender attacks.

No one is accusing ChronoPay or Mr. Vrublevsky. However, the attacks did end shortly after ChronoPay’s office was raided, there was preexisting evidence suggesting they were involved, and the fact that the police raided them, all make for one hell of a coincidence, if they are indeed not guilty as they claim.

Google just Launched their +1 Button.
Show your Support for iSource By Clicking!

View the original article here

0 Responses so far.

Post a Comment