back to article Extortion trojan watches until crims find you doing something dodgy

A newly-detected piece of malware dubbed "Delilah" has been fingered as probably the first such code created with the intention of extorting victims into stealing insider data. The "Delilah" malware was found on exclusive crime forums by Israeli intelligence outfit Diskin Advanced Technologies, who say the trojan relies on a …

  1. Anonymous Coward
    Anonymous Coward

    Why, why, whyyyyy...

    Watch out TOM, Dick or Harry!

  2. allthecoolshortnamesweretaken

    Clever. Looks like someone has been reading their Le Carré - blackmailing someone is always cheaper than paying them off.

  3. Pascal Monett Silver badge
    Trollface

    "chewing conspicuous quantities of resources on some victims' machines"

    Oh, you mean acting like Norton anti-virus then. No problem, nobody's going to notice that.

    1. Nolveys

      Re: "chewing conspicuous quantities of resources on some victims' machines"

      Oh, you mean acting like Norton anti-virus then.

      It can't be that bad. Even virus writers have some dignity.

    2. Anonymous Coward
      Anonymous Coward

      Re: "chewing conspicuous quantities of resources on some victims' machines"

      I heard about this nasty vile piece of software ages ago, I even spent a short time looking at it in action.

      You must have seen all the phoney over-hyped propaganda.....

      You may have seen it under the pseudonym "Windows 10"

  4. chivo243 Silver badge

    sounds like

    Wife 1.0 software to me... gathering info, lording it over you, extorting you to lift the toilet seat etc...

    1. Kiwi
      Devil

      Re: sounds like

      ...extorting you to lift the toilet seat etc...

      An application of freeze-spray shortly before she enters or dusting with various powdered peppers, careful placement of sharp objects etc soon encourage them to check for themselves rather than relying on you to do such a simple job..

      That or the leave..

      Either way, problem solved :)

      See icon for why..

      <dnrfc - El Reg, can we have a flying rolling pin or frying pan (cast iron of course) icon?>

  5. Aaiieeee
    Pirate

    Be careful what you search for

    This is actually pretty clever.. and scary!

    Can't say I'm surprised though. Some poor sod who has been looking at porn will have an email send to their entire family with all the sites they visited alongside their picture because they didn't supply the data the crooks wanted. Or they get banged up for 10 years for stealing corporate/gov secrets.

  6. Uffish

    Crims send email to your family...

    Which is of course believed, especially when you have a copy of their original blackmailing emails.

    May I volunteer for the team developing honeypots for this trojan, should be fun.

  7. Anonymous Coward
    Facepalm

    Extortion trojan hacks peoples brains.

    Surely the Anti-Virus and Firewall should have halted this extort-bot in its tracks? Take extreme caution reading the below code as it could hack your brain, like what happened to those people in Threshold :)

    msg1 [ ]=355200/x

    msg2 [ ]=778600/y

    static unsigned bar code

    ptr = "/c @65299 XYZ

    exe filenm "yxs" @ 43990/y

    (x=433j99800; X<7762629999900; [ ] = 652500/x)

    if @x=="7268649928200"; [ ] = 8738734/y

    if @y=="9347973387477"; [ ] = 2983080/x

    exit

    if @ x==97994393784 || @ x==384783

    endif @ x ==43095808

    1. Anonymous Coward
      Anonymous Coward

      Re: Extortion trojan hacks peoples brains.

      "Take extreme caution reading the below code as it could hack your brain, like what happened to those people in Threshold :)"

      No. They're saying its buggy. It hasn't yet morphed to a cross between Facebook and Pokemon go.

      You need to worry when Occulus becomes untethered.

      Anon, cause we all, will need to be.

  8. Triggerfish

    is this another

    Windows 10 story?

  9. Old Handle

    It's a devious plan, but it seems to me the odds of catching anyone doing something blackmail-worthy at random are relatively low. I suppose this is more designed for targeted attacks.

  10. Jtom

    Ever realize how many criminal cases, divorces, and embarrassments could be avoided if computers were sold already containing porn of all types, along with internet history reflecting such sites and emails containing porn? Then you could raise the very valid defense that all that junk already existed, unknown to you, when you purchased the device.

    Come to think of it, a virus that serruptiously planted illegal porn on computers could torpedo a great many criminal cases, especially if it infected the legal system.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like