Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Public

Call of Duty Trojan horse creator ends up in jail for 18 months

Paul Anderson by Paul Anderson
May 17, 2012 - Updated on October 18, 2012
in Public, Technology News
0
callofdutywallpapper43
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

callofdutywallpapper43A British man who spread a spyware Trojan horse posing as a patch for the popular video game “Call of Duty”, has ended up with an 18 month jail sentence.

You might also like

Silent OS 3.0 for Blackphone Completely revamped

Megaupload Plans to Return After 5 Years

Exploit Kit activity on a steep decline since April

According to local media reports, 20-year-old Lewys Martin of Deal, Kent, distributed a Trojan horse amongst game players, which logged keystrokes and stole bank details, credit card numbers and internet passwords – including PayPal credentials – from innocent computer users.

After selling the stolen details to other cybercriminals for between $1 to $5 a time, Martyn moved his ill-gained profits to an offshore account in Costa Rica.

Bizarrely, Martin’s activities were only uncovered after he was caught drunkenly attempting to break into local colleges to steal computer equipment, Kent Online reports.

Police who raided Martin’s home, found printouts of stolen credit card numbers and details of a fraudulent bank loan.

Last November, Martin had his sentence deferred by Canterbury Crown Court to allow him to attend a university computer course, and he was put on bail.

But it seems that Martin couldn’t put his burglary habit behind him, and in March this year he broke his bail conditions by breaking into the Walmer Science College in Deal, causing hundreds of pounds of financial damage, and attempting to steal a computer, hard drive, walkie-talkies and other equipment.

Now he has been jailed for 18 months for three burglary and fraud charges and asking for another five to be taken into consideration.

Prosecutor Edmund Burge said it was unclear how much money Martin had made from his criminal activities, because the funds were held offshore:

"We don’t know how much money he got through selling the card details because the money is in a bank which won’t co-operate with the authorities. But Martin admitted to police that it was in the thousands of pounds."

Although Martin’s defence lawyer pleaded for leniency, and the opportunity for Martin to complete his university course, the court appeared to have run out of patience with the young computer enthusiast and jailed him for 18 months.

The authorities are understood to be attempting to recover the money that Martin made through his cybercriminal activities.

Game players would be wise to pay attention to the technique used by Lewys Martin to infect computers. It’s not uncommon for malware to be distributed in the form of cracks and hacks for popular computer games – if you run unknown code on your computer to meddle with a video game, you might well be allowing malware to insidiously install itself too.

Source: nakedsecurity.sophos.com

Tags: call of dutylatestmalwaresecuritytech newsthreat
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Silent OS 3.0 for Blackphone Completely revamped

by Paul Anderson
July 24, 2016 - Updated on May 17, 2022
1
Silent OS 3.0 for Blackphone Completely revamped

Version 3.0 migrates Silent OS to Android Marshmallow 6.0.1 and delivers the Android safety patch level to June 2016. Along with fixes for security vulnerabilities, Silent OS 3.0...

Read more

Megaupload Plans to Return After 5 Years

by Paul Anderson
July 15, 2016 - Updated on May 26, 2022
0
Megaupload Plans to Return After 5 Years

The huge file-sharing website, Megaupload is scheduled to relaunch, five years after being raided and shut down by the FBI. After its owner, Kim Dotcom, was detained and...

Read more

Exploit Kit activity on a steep decline since April

by Paul Anderson
July 12, 2016
0
Exploit Kit activity on a steep decline since April

As malware writers are moving to Neutrino and RIG exploit kits (EK) for dispersal needs, security experts are investigating how distribution is innovating, and they are generally signaling a huge...

Read more

EasyDoc malware infects Macs and routes through TOR

by Kyle
July 6, 2016
0
EasyDoc malware infects Macs and routes through TOR

Antivirus company, Bitdefender has released an alert regarding a harmful application that infects Macs and connects to the command-and-control servers via Tor. The program, called EasyDoc Converter.app, claims...

Read more

Hummer malware infecting androids earns $3.5 Million a week

by Paul Anderson
July 6, 2016 - Updated on May 17, 2022
0
Hummer malware infecting androids earns $3.5 Million a week

A new Trojan, named Hummer, has been discovered infecting Android phones. The malware creators are earning an estimated $3,500,000 a week or $500,000 a day say researchers at...

Read more
Next Post
DoS Vulnerability in Bitcoin

DoS Vulnerability in Bitcoin

Related News

NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Netwire RAT seized by FBI and other worldwide police agencies

Netwire RAT seized by FBI and other worldwide police agencies

March 16, 2023
The Emotet botnet returns and is sending a slew of malicious emails

The Emotet botnet returns and is sending a slew of malicious emails

March 14, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.