Offshore Outsourcing & Scammer

Blog about offshore outsourcing and scammer in the outsourcing industry

Caught WhatsApp messages leaded to Belgian terrorist captures

WhatsAppEnd-to-end encryption holes in WhatsApp message metadata have uncovered jihad terrorists.

The FBI has been campaigning hard to get free access to the messages went by scrambled informing administrations. Yet, it clearly didn't require that level of access to WhatsApp messages sent between individuals from a charged Chechen jihadist gathering working in Belgium. As per a report by Bloomberg, a couple of men were captured and warrants were issued for three others for supposedly get ready for a terrorist as in Belgium. 

The captures took after attacks in which 16 individuals were confined, which Belgian law implementation authorities said was the consequence of "working with U.S. authorities to monitor suspects’ communications on WhatsApp Inc.’s messaging service," Bloomberg's Gaspard Sebag reported. 

The BBC reports that the men fixing to the al-Nusra Front in Syria and the Islamic Caucasus Emirate. One man confined had as of late come back to Belgium injured in battle in Syria while battling with al-Nusra. There were two gatherings attacked one in Ostend on Belgium's coast, and the other inland at Louvain. The Louvain gathering was said to be plotting a terrorist assault in Belgium. BBC likewise refered to Belgian authorities as saying WhatsApp messages blocked by the US government were utilized to follow the gathering. 

WhatsApp started giving end-to-end (E2E) encryption of its messages last November with the joining of security specialist Moxie Marlinspike's WhisperSystems encryption convention TextSecure. In principle, if TextSecure were being used by the affirmed terrorists, the substance of their messages would have been exceptionally hard to peruse; the TextSecure convention persistently changes sets of encryption keys with each new message. Yet, it’s dubious that the messages were scrambled especially since E2E encryption is not upheld by the Apple iOS rendition of WhatsApp, and gathering messages and pictures aren't bolstered by WhatsApp for Android yet. 

Regardless of the possibility that a percentage of the messages stayed secured by encryption, it’s conceivable that the FBI or NSA assembled metadata at the server for the messages. That metadata could have been utilized to build up the associations between the suspects and the injured jihadi, which would have permitted the US organizations or Belgian law requirement to accomplish more focused on observation. 

In an article in German magazine C'T, proofreader Fabian A. Scherschel dove into the encryption conspire in WhatsApp and battled that it didn't shift the key used to scramble data in travel rather, it utilized a key got from the client's watchword and encryption code in light of the RC4 calculation for both inbound and outbound correspondence. The hint was that captured and gathered messages could hypothetically be broken a great deal all the more effortlessly since the key seeds could be all the more effectively discovered on the grounds that it diminished the quantity of conceivable keys. Be that as it may, in a reaction to the article presented on Reddit, Moxie Marlinspike said, "This article should be retitled 'Breaking News: WhatsApp E2E Deployment Process Exactly As Advertised.'  We announced a partnership, not a finished deployment. In the blog post announcing that partnership, we publicly outlined the WhatsApp E2E deployment process, and it describes exactly what has been 'discovered' here. As I said in the blog post, deploying across this many users (hundreds of millions) and this many platforms (seven, of which they checked two) takes time, and is being done incrementally. I also point out that we will be surfacing information in the UI once that is complete."

 

Android Ransomware - Porn Droid

AndroidAs of late, zscaler ran over another variation of Porn Droid - an Android ransomware variation guaranteeing to be from the FBI, which blames individuals for watching youngster porn and after that requests a fine of USD 500.

It at first seems to the client as though they are downloading an obscene feature, yet once the client taps on the document, it takes on the appearance of the Google patch overhaul and traps the client into introducing the application.

Screenshot Update Patch Installation
It looks like a patch application

In the wake of clicking "Continue", the malware requests head access to the gadget asking for consents, for example, "Erase all data", "Set storage encryption", "Change the screen-unlock password" as demonstrated in screenshot beneath.

Screenshot: Activate Device Administrator - Porn Droid
Admin access

Once the client taps on the "ACTIVATE" button, the malware gets head control of the gadget and locks it while showing a fake FBI cautioning as seen underneath. It bolts the client's telephone by incapacitating keyguard and sets top need for the malware application which guarantees that no other application or client action can override the malware application's movement.

Screenshot: FBI device lock
FBI warning message

Screenshot: FBI Paypal payment
Payment tab

The FBI cautioning screen additionally contains dynamic data significant to the tainted gadget, for example, the program history, IMEI number, telephone number and casualty's photo, which has been taken by the malignant application. This is done to threaten the end client as a notice message proposes that the data will be utilized by the FBI to recognize the client if the fine is not paid.

Screenshot: FBI with user information
Screen with user information

Detailed analysis: zscaler ThreatLab

 

Fraud warning sites

As I working every time transparent and don't hide any information, I have made a link collection of anti fraud information systems for your comfort. There you can find descriptions about the actual published scams. In any case you have to use your brain for not getting scammed. Everything, which sounds too good to be true is normally only a scam.

Internet Crime Fighters Organization
Internet Crime Fighters Organization Internet Crime Fighters Organization - Harnessing the Power of Internet Connectivity to Combat Internet Crime; Security Threats, Scams, Fraud

SCAMwatch
A scam warning site from the Australian Government

Scam shield
Scam Shield is a non-profit organization protecting citizens from scams and fraud schemes with advocacy and knowledge. Volunteers provide the fraud victims with helpful information and assistance.

ScamXposer
ScamXposer | Make Money Online Business and Income Opportunity Scams & Reviews

scam.com
Message board for posting various scams. Powered by VBulletin. Don't get scammed at scam.com

WOT - Web Of Trust
WOT is a free website reputation, rating and review tool that helps find trustworthy websites and protects against online scams, untrustworthy links, and unreliable web stores. Free add-on for Firefox, IE, Chrome, Opera and Safari browsers.

HOAX-SLAYER
Stay informed about the latest email hoaxes and scams by subscribing to the Hoax-Slayer Newsletter.

FBI
Federal Bureau of Investigation - Internet Fraud

Avoid getting scammed - make a background check
Description of free tools helping to identify scammer.

VOIP Fraud List
News | Voip Fraud LIST recommended by Nata Ellis (nata@speedflow.com)

A list of proved scammer can get found in the menu entry Scammer Exposed.

Offers from trusted and validated brokers can get found in the menu entry Fair Campaign Offers.