Kenzero

Kenzero is a computer trojan that is spread across peer-to-peer (P2P) networks and is programmed to blackmail its victims by collecting personal information and publishing their browsing history online in a public database.[1]

History

The Kenzero trojan was first discovered by Symantec on November 27, 2009, but researchers believe it had spread undetected for a few months prior.[2]

According to cybersecurity experts, Kenzero originated in Japan and is believed to be created by the same cybercriminal group behind the earlier trojan viruses Zeus and Koobface.[3]

Operations

Kenzero attacks computers that download files through peer-to-peer (P2P) networks. A fake installation screen appears upon downloading an infected file, prompting victims to enter personal information. The virus then logs the victim's browsing history and publishes it online in a database.[4][5] Finally, a dialog box or email is sent to the victim demanding a fee of approximately $16 USD for the removal of their browsing history from the database.[6]

The virus hides inside video files of hentai anime and spreads via P2P file sharing networks.[6]

References

  1. ^ Kenzero Virus Blackmails Those Who Illegally Download Anime Porn, by Caleb Johnson, April 16, 2010, Switched
  2. ^ [Infostealer.Kenzero] [1]
  3. ^ Browsing histories published online in Kenzero virus scam, By Claudine Beaumont, 16 Apr 2010, The Telegraph
  4. ^ Browsing histories published online in Kenzero virus scam, By Claudine Beaumont, 16 Apr 2010, The Telegraph
  5. ^ Blackmail virus infects computers, holds information ransom Archived 2016-06-11 at the Wayback Machine, By Josh Harvison, Sep 27, 2010, KAIT-Jonesboro, AR-News
  6. ^ a b Banks, Tom. "The Computer Virus Catalog". Design Week.