Spanish law enforcers arrested FluBot malware operators

Last week, the Barcelona authorities announced that law enforcement officers had arrested possible operators of FluBot Android malware. Four people are suspected of running the Android botnet FluBot, which has already infected more than 60,000 devices.

For the first time FluBot was noticed by ThreatFabric experts at the beginning of this year, and recently analysts of the Swiss company PRODAFT prepared a detailed report on this malware. Apparently, collected by the experts data led to the arrest of the malware operators.

FluBot is a banking Trojan capable of displaying fake login screens on top of other apps. Thus, the malware collects e-banking credentials and payment card details of its victims.

The impressive number of FluBot infections may be explained by the presence of a worm-like mechanism in its malware code, thanks to which attackers can download the victim’s address book to their command-and-control server and send malicious SMS spam from there.

“More than 11 million phone numbers were collected from infected devices (almost 25% of the total population of Spain)”, – PRODAFT analysts warned.

Catalan officials say they tracked at least 71,000 spam messages sent by the group.

Spanish law enforcement officials report that they detained four men aged 19 to 27, whose names were not disclosed. Two of them are considered the leaders of the group and were kept in custody, while two more were released, but are required to appear in court. It seems that one of the leaders of the hack group was responsible for the technical side of FluBot’s operations, wrote malware and created fake login pages to simulate various banking transactions.

Investigators also searched the suspects’ apartments, where they seized cash, laptops, documents and mobile devices. Some of these mobile devices were allegedly bought with the money of the victims.

“In addition to making money transfers [from victims ‘accounts], criminals paid with victims’ cards and bought luxury mobile phones, which they sent to people living in the province of Madrid who received money for getting parcels”, — the authorities say.

Despite these arrests, FluBot is still active and continues to spread. It is not yet clear whether the other members of the hacker group, who manage the botnet, have not been arrested yet, or whether the malware’s control servers are working automatically, and now the botnet is functioning by inertia.

William Reddy

I am from Ireland. My parents bought me a computer when I was 11, and several month after I have got a virus on this PC. I decided to enter the INSA Centre Val de Loire university after being graduated from the school. This French educational institution was offering a brand-new cybersecurity course. After getting the master degree in cybersecurity, I've started working in as virus analyst in a little anti-malware vendor. In 2018, I've decided to start Virus Removal project. The main target of this site is to help people to deal with PC viruses of any kind.

Leave a Reply

Your email address will not be published. Required fields are marked *


Back to top button