Stories
Slash Boxes
Comments

SoylentNews is people

posted by CoolHand on Tuesday August 16 2016, @04:28PM   Printer-friendly
from the vigilante dept.

Some may have heard of scambaiting spammers to waste their time and resources. There are many sites like 419eater which concentrate on it. However, Arthur T Knackerbracket has found the following story which takes things a step further. A French security researcher says he managed to turn the tables on a cyber-scammer by sending him malware. Whether or not that is ethical is left as an exercise for the readership.

But Ivan Kwiatkowski played along with the scheme until he was asked to send credit card details. He instead sent an attachment containing ransomware.

[...] When Mr Kwiatkowski's parents stumbled across one such website, he decided to telephone the company and pretend he had been fooled.

The "assistant" on the telephone tried to bamboozle him with technical jargon and encouraged him to buy a "tech protection subscription" costing 300 euros (£260).

Mr Kwiatkowski told the assistant that he could not see his credit card details clearly and offered to send a photograph of the information.

But he instead sent a copy of Locky ransomware disguised as a compressed photograph, which the assistant said he had opened.

"He says nothing for a short while, and then... 'I tried opening your photo, nothing happens.' I do my best not to burst out laughing," Mr Kwiatkowski wrote in his blog.

[...] Mr Kwiatkowski said he could not be absolutely certain whether the ransomware had infected the scammer's computer, but there was a fair chance it had.

"He did not let on that something had happened to his computer, so my attempt is best represented as an unconfirmed kill," said Mr Kwiatkowski.

"But encrypting a whole file system does take some time."

He acknowledged that some people may have found his retaliation unethical, but said responses had been "mostly positive".


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by rob_on_earth on Wednesday August 17 2016, @08:25AM

    by rob_on_earth (5485) on Wednesday August 17 2016, @08:25AM (#389045) Homepage

    I applaud you for this, really. But what if the scammer is on a library or campus network and your ransom ware now encrypts files other than the scammers?

    There was a worm written that fixed one of the big SQL attack vectors, Code Red or Slammer that wound up fixing many many servers but also crippling a few by rebooting them unexpectedly.

    My domain was part of a back-scatter email campaign and I had all sorts of nasty responses from individuals that thought I was spamming them. I hate to think what would have happened if they had script-kiddie hack-back scripts. (back-scatter is where you spoof the sender and use multiple email address from the same domain).

    I hope knowledgeable people do continue to fight back, but the moment "anyone" can start hacking-back things are going to get painful.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2