WannaCry ransomware attack was the hottest topic in the past couple of weeks among everyone. It damaged computers which used the Windows Operating System to a level where it left users helpless. Previous articles by us gave you in-depth information regarding this topic on numerous occasions.
The damage is done! There is no option left but to find a mechanism to jump out of the damage which WannaCry caused. With this intention in mind, two researchers have successfully managed to develop a decryption tool to unlock the locked files without paying a single penny to the cyber attackers. Namely, these two tools are WannaKey and WannaKiwi.
WannaCry made hundreds of lives of over 150 countries a disaster a couple of weeks ago. The ransomware attack spread so fast and infected many individuals and companies which put them in a devastated state. We educated you on how to shield your computer from this malware in an article published on an earlier day as well.
“Kanchayudha” game had caught our attention since several months. It is claimed as the biggest ever computer game made in Sri Lanka. So, we tried to do an interview with the team. Finally, we could do a quick interview despite their busy schedules.
A group of Russian criminals called “Ad Fraud Komanda” or “AFK13” were caught earning money between $3 million to $5 million each day. They earn money by doing faking clicks on video ads on the advertising market. It is revealed by White Ops which is a security firm that provides online fraud detection solutions. This criminal is the biggest digital ad fraud ever.
First they created 250,127 distinct URLs and more than 6000 domains that appeared to belong to real reputed publishers. They misled the algorithms that decide where the most profitable ads would direct into buying their fraudulent web space. These algorithms typically make bids for ad spaces which are most suitable for advertisement’s intended audience. Hence their fraudulent web space was purchased by many reputed brands.
Then they invested heavily in a bot farm that consisted more than 570,000 bots. Next they triggered faked traffic on the ads using those bots, thereby driving a huge amount of revenue thanks to the pay-per-click scheme they’d exploited. Those bots have watched more than 300 million video ads a day, with an average payout of $13.04 per thousand fake views. This bot army was also programmed in order to imitate the actions of real people, such as faked clicks with mouse movements and social network login information. White Ops called this crime as Methbot campaign.
White Ops provided an example of how they faked a domain
They used thousands of IP addresses to make those bots appear more real, so they can bypass typical anti-fraud detection measures. Theses IP addresses were associated with major U.S Internet Service Providers, so it seemed they were based in America itself. Those IP addresses were fraudulently obtained from at least two of the world’s five regional Internet registries.
Those who were spending on the automated systems were losing a significant amount of money, not only because of the Methbot but also due to other similar campaigns. Those funds might never be retrieved. The White Ops company wrote in its white paper. “At this point the Methbot operation has become so embedded in the layers of the advertising ecosystem, the only way to shut it down is to make the details public to help affected parties take action.”