{"id":16158,"date":"2014-03-18T09:10:57","date_gmt":"2014-03-18T15:10:57","guid":{"rendered":"https://www.webroot.com/blog/?p=16158"},"modified":"2018-10-05T13:18:15","modified_gmt":"2018-10-05T19:18:15","slug":"5m-harvested-russian-mobile-numbers-service-exposes-fraudulent-infrastructure","status":"publish","type":"post","link":"https://www.webroot.com/blog/2014\/03\/18\/5m-harvested-russian-mobile-numbers-service-exposes-fraudulent-infrastructure\/","title":{"rendered":"5M+ harvested Russian mobile numbers service exposes fraudulent infrastructure"},"content":{"rendered":"<p>Cybercriminals continue adapting to the exponential penetration of mobile devices through the systematic release of <a href=\"https://www.webroot.com/blog/2013\/02\/07\/mobile-spammers-release-diy-phone-number-harvesting-tool\/\"><strong>DIY (do-it-yourself)<\/strong><\/a> mobile number <a href=\"https://www.webroot.com/blog/2013\/04\/18\/diy-russian-mobile-number-harvesting-tool-spotted-in-the-wild\/\"><strong>harvesting tools<\/strong><\/a>, successfully setting up the foundations for <a href=\"https://www.webroot.com/blog/2012\/05\/07\/managed-sms-spamming-services-going-mainstream\/\"><strong>commercial managed<\/strong><\/a>\/<a href=\"https://www.webroot.com/blog/2013\/07\/04\/newly-launched-underground-market-service-harvests-mobile-phone-numbers-on-demand\/\"><strong>on demand mobile phone number harvesting services<\/strong><\/a>, ultimately leading to an influx of mobile \u00a0malware\/spam campaigns. In addition to boutique based DIY operations, sophisticated, &#8216;innovation&#8217; and market development-oriented cybercriminals are actively working on the development of <a href=\"https://www.webroot.com/blog/2013\/06\/28\/how-cybercriminals-create-and-operate-android-based-botnets\/\"><strong>commercially available<\/strong><\/a> Android-based <a href=\"https://www.webroot.com/blog/2013\/10\/25\/cybercriminals-release-new-commercially-available-androidblackberry-supporting-mobile-malware-bot\/\"><strong>botnet generating tools<\/strong><\/a>, further <a href=\"https://www.webroot.com/blog/2013\/06\/25\/infographic-malicious-mobile-apps\/\"><strong>fueling growth into the market segment<\/strong><\/a>.<\/p>\n<p>In a series of blog posts, we&#8217;ve been profiling multiple cybercrime-friendly services\/malicious Android-based underground market releases, further highlighting the professionalization of the market segment in terms of sophistication and\u00a0<a href=\"https://www.webroot.com/blog/2013\/02\/27\/how-mobile-spammers-verify-the-validity-of-harvested-phone-numbers\/\"><strong>QA<\/strong><\/a> (<a href=\"https://www.webroot.com/blog/2013\/04\/16\/how-mobile-spammers-verify-the-validity-of-harvested-phone-numbers-part-two\/\"><strong>Quality Assurance<\/strong><\/a>).<\/p>\n<p>We&#8217;ve recently spotted a service offering 5M+ harvested and segmented Russian mobile phone numbers on a per business status\/gender\/driving license basis. What&#8217;s particularly interesting about this service is the fact that it exposes a long-run fraudulent Win32:SMSSend serving infrastructure (<a href=\"http:\/\/hphosts.blogspot.com\/2010\/01\/sevahost-as-seva-host-ltd-as49313-and.html\"><strong>SEVAHOST-AS Seva-Host Ltd (AS49313<\/strong><\/a>), segmented harvested mobile phone numbers of Sochi citizens, a fake (paid) medical leave\/absence service targeting Sochi citizens, and a portfolio of rogue mobile apps leading to the exposure of a mobile botnet, surprisingly relying on an identical hardware\/bot ID.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshot of the 5M+ harvested mobile phone numbers service:<\/strong><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers.png\"><img decoding=\"async\" loading=\"lazy\" width=\"989\" height=\"1961\" class=\"size-full wp-image-16168 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers.png\" alt=\"Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers.png 989w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers-151x300.png 151w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers-516x1024.png 516w\" sizes=\"(max-width: 989px) 100vw, 989px\" \/><\/a><\/p>\n<p>The service&#8217;s main URL responds to 91.228.155.210.<\/p>\n<p><strong>Parked on the same IP (91.228.155.210) are also the following fraudulent\/cybercrime-friendly domains:<\/strong><br \/>\nhxxp:\/\/instagramm-registration.ru<\/p>\n<p><strong>Related rogue game MD5s known to have been (historically) hosted at the same IP (91.228.155.210):<\/strong><br \/>\nMD5: 68c1c11d86bc272e9a975400e2991e41<br \/>\nMD5: 3ccf8cfc88d7228e8e4345d389ce56ef<br \/>\nMD5: 6bf0482a0bd8fcf19a88e7a03abd69ef<br \/>\nMD5: 232c501fec973e8923143e41b520f698<br \/>\nMD5: 5601f871f3f1873c1da971358799f088<br \/>\nMD5: 94abca6d4ec24fdbe1ec74f40b4a77cd<br \/>\nMD5: 126bc6cb8e58c7859768d9390c726774<br \/>\nMD5: 966e3bbd0f77463403bb200454544cd4<\/p>\n<p><strong>The following malicious MD5s are also known to have phoned back to the same IP (91.228.155.210):<\/strong><br \/>\nMD5: 6e6a09ec8235705f314ed2fae8fab01a<br \/>\nMD5: 676dc0a061886bf537e01ddceb6c9230<\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers__.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"869\" class=\"size-large wp-image-16197 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers__-1024x869.png\" alt=\"Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers__\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers__-1024x869.png 1024w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers__-300x254.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers__.png 1097w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>The existence of the secondary services (segmented mobile phone numbers belonging to Sochi citizens\/paid medical leave services), parked on the same IP as the original 5M+ harvested mobile phone numbers offering service, is a decent example of market segmentation in the context of an event-based type of underground market offering targeting the Sochi Olympics. Not surprisingly, cybercriminals have already taken advantage of this segment, and in a true fraudulent\/malicious nature, have launched social engineering driven\u00a0<strong><a href=\"http:\/\/www.securelist.com\/en\/blog\/8180\/Mobile_scammers_target_sports_fans\">Android-based malware serving SMS spam campaigns<\/a>\u00a0<\/strong>(MD5:\u00a0361e92c344294d8b4fce0c302f61716a).<\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers__01.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"913\" class=\"size-large wp-image-16196 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers__01-1024x913.png\" alt=\"Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers__01\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers__01-1024x913.png 1024w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers__01-300x267.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers__01.png 1037w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p><strong>Sample screenshot of the fraudulent Instagram site parked on the same IP\u00a0(91.228.155.210):<\/strong><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_01.png\"><img decoding=\"async\" loading=\"lazy\" width=\"961\" height=\"619\" class=\"size-full wp-image-16170 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_01.png\" alt=\"Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_01\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_01.png 961w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_01-300x193.png 300w\" sizes=\"(max-width: 961px) 100vw, 961px\" \/><\/a><\/p>\n<p><strong>Redirection chain for the rogue Instagram app site:<\/strong><br \/>\n<em>hxxp:\/\/instagramm-registration.ru\/<\/em> -&gt; <em>hxxp:\/\/domainusers.biz\/?page=lending&amp;type=soft&amp;size=1&amp;ext=rar&amp;link=http:\/\/tds-link-asg.biz\/?tds=1275&amp;page=search&amp;parent=similar&amp;key=Instagram_registration_(soft).zip&amp;key=programma_instagram_register_PC<\/em> -&gt;<br \/>\n<em>hxxps:\/\/www.tcsbank.ru\/credit\/form\/cash\/?utm_source=troywell_apr_cc&amp;utm_medium=aft.apr&amp;utm_content=network&amp;utm_campaign=creditcard&amp;wm=1otx&amp;sid=701411425&amp;prx=701411425<\/em><\/p>\n<p><strong>Redirectors domain name reconnaissance:<\/strong><br \/>\ndomainusers.biz &#8211; 91.202.63.117<br \/>\ntds-link-asg.biz &#8211; 91.202.63.119<\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_02.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"534\" class=\"size-large wp-image-16173 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_02-1024x534.png\" alt=\"Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_02\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_02-1024x534.png 1024w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_02-300x156.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_02.png 1213w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p><strong>Name server reconnaissance for the redirectors:<\/strong><br \/>\nNS11.LIMONBUCKS.COM &#8211; 91.217.85.34 &#8211; Email: sevacash@gmail.com &#8211; <strong><a href=\"http:\/\/hphosts.blogspot.com\/2010\/01\/sevahost-as-seva-host-ltd-as49313-and.html\">SEVAHOST-AS Seva-Host Ltd (AS49313)<\/a><\/strong><br \/>\nNS12.LIMONBUCKS.COM &#8211; 91.217.85.37 &#8211; Email: sevacash@gmail.com<\/p>\n<p><strong>Name servers resonnaissance of the rogue\/fraudulent mobile apps serving rogue affiliate network operating the redirectors:<\/strong><br \/>\nns1.sevadns.com &#8211; 91.217.85.35 &#8211; hxxp:\/\/sevadns.com -&gt; hxxp:\/\/seva-hosting.com (91.217.85.35)<br \/>\nns1.sevadns.com &#8211; 91.217.85.36<\/p>\n<p><strong>A peek inside sample statistics from the rogue mobile apps serving affiliate network:<\/strong><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_04.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1000\" height=\"772\" class=\"size-full wp-image-16181 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_04.png\" alt=\"Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_04\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_04.png 1000w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_04-300x231.png 300w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>\n<p>Known to have phoned back to (<strong>91.202.63.119;\u00a0tds-link-asg.biz<\/strong>) is also the following malicious <strong><a href=\"https:\/\/www.virustotal.com\/en\/file\/d32703a06093908094908ef38c8e21bed2f299aa635f9e92f88e54e802ced7f6\/analysis\/\">MD5: bf0074d6e2745925ec8ef3225a2052e1<\/a>.\u00a0<\/strong>Known C&amp;C &#8211; <em>hxxp:\/\/91.202.63.119\/showthread.php?j6m=452416&amp;nmhn=401c4ab9717ac07af8449176f3b07cfb&amp;o=8,f4aacf34b635ccbe03dcc87bc52e7c49<\/em>. Responding to the same IP, is also the Web site of the <a href=\"http:\/\/ddanchev.blogspot.com\/2013\/11\/a-peek-inside-customer-ized-api-enabled.html\"><strong>mobile traffic\/rogue apps serving affiliate network<\/strong><\/a>.<\/p>\n<p><strong>Known C&amp;C domain responding to the same IP:<\/strong> majdong.ru (91.202.63.119)<\/p>\n<p><strong>Related DNS requests performed by the sample (<strong><a href=\"https:\/\/www.virustotal.com\/en\/file\/d32703a06093908094908ef38c8e21bed2f299aa635f9e92f88e54e802ced7f6\/analysis\/\">MD5: bf0074d6e2745925ec8ef3225a2052e1<\/a>)<\/strong>:<\/strong><br \/>\nedreke.ru<br \/>\nedreke.ru.ovh.net<\/p>\n<p><strong>Name servers reconnaissance:<\/strong><br \/>\nName server: ns1.zippro.ru &#8211; 37.221.164.2<br \/>\nName server: ns2.zippro.ru &#8211; 37.221.164.3<\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_03.jpg\"><img decoding=\"async\" loading=\"lazy\" width=\"938\" height=\"536\" class=\"size-full wp-image-16179 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_03.jpg\" alt=\"Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_03\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_03.jpg 938w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Mobile_Malware_SMS_Spam_Fraud_Cybercrime_Harvested_Mobile_Phone_Numbers_03-300x171.jpg 300w\" sizes=\"(max-width: 938px) 100vw, 938px\" \/><\/a><\/p>\n<p><strong>Known to have phoned back to the same C&amp;C server majdong.ru (91.202.63.119) are also the following malicious MD5s:<\/strong><br \/>\nMD5: 9a05f7572ff50115fb22a4b3841ab137<br \/>\nMD5: 00adadb8e8a1d73c444134f2d1c1fba0<br \/>\nMD5: 651397e89d4b5687d1c8ce4834dc4234<br \/>\nMD5: bf0074d6e2745925ec8ef3225a2052e1<\/p>\n<p><strong>Known to have been downloaded from the same IP (ns1.zippro.ru &#8211; 37.221.164.2) are also the following malicious MD5s:<\/strong><br \/>\nMD5: b58b0539818762becd4f5051a3c81b46<br \/>\nMD5: a385f6362f5ceb69db4c03ed324dfc34<\/p>\n<p><strong>Known to have phoned back to (ns1.zippro.ru &#8211; 37.221.164.2) are also the following malicious MD5s:<\/strong><br \/>\nMD5: c6e5c1508ace1dfed450f8f69b11f1e6<br \/>\nMD5: f5399127b908f5a3ad994ca0e681cb26<br \/>\nMD5: aad3f6de5ae8c595797c55716a83adde<\/p>\n<p><strong>Known to have been downloaded from the same IP (ns2.zippro.ru &#8211; 37.221.164.3) are also the following malicious MD5s:<\/strong><br \/>\nMD5: 522c729109ba4a51b5f361d33b5b3edb<br \/>\nMD5: 243934ec2546c54c1cb6d9309896a035<br \/>\nMD5: 578d5a1f5b968d01e553f7c94e12b235<br \/>\nMD5: b7baa6ccf6d9242b7e5d599830fa12b1<\/p>\n<p><strong>Known to have phoned back to (ns2.zippro.ru &#8211; 37.221.164.3) are also the following malicious MD5s:<\/strong><br \/>\nMD5: ac3477ad87db7cfe4373cb2135eb1387<br \/>\nMD5: be49f224212ac9e05ae6b67b299350f2<br \/>\nMD5: a6f82de33bf03e8cb197cbc426942dca<br \/>\nMD5: 3204e633b6892171830004aedc5b6907<br \/>\nMD5: e31e8f4805768c326e28c68a6f406acc<br \/>\nMD5: d9920001704950e4f4c18d6e2ec30aae<br \/>\nMD5: 132cec7617f656db385d7acf31cd3393<br \/>\nMD5: be49f224212ac9e05ae6b67b299350f2<br \/>\nMD5: a6f82de33bf03e8cb197cbc426942dca<br \/>\nMD5: 93dfb678ecd06d27e59f96f2f30a52d5<\/p>\n<p>Based on our analysis, we were able to successfully identify an identical pseudo-random hardware ID\/bot ID, that we were also able to connect to related W32.SMSSend campaigns, further confirming that\u00a0<a href=\"https://www.webroot.com/blog/2014\/02\/20\/spamvertised-received-new-message-skype-voicemail-service-themed-emails-lead-angler-exploit-kit\/\"><strong>cybercriminals continue to actively multi-task in 2014<\/strong><\/a>.<\/p>\n<p><strong>Related W32.SMSSend hardware ID\/bot ID campaigns using the same pseudo-random ID:<\/strong> 401c4ab9717ac07af8449176f3b07cfb<\/p>\n<p><strong>Sample fraudulent W32.SMSSend MD5s relying on the same pseudo-random ID known to have phoned back to 64.120.227.154\/185.15.209.17:<\/strong><br \/>\nMD5: ac3477ad87db7cfe4373cb2135eb1387<br \/>\nMD5: be49f224212ac9e05ae6b67b299350f2<br \/>\nMD5: a6f82de33bf03e8cb197cbc426942dca<br \/>\nMD5: 93dfb678ecd06d27e59f96f2f30a52d5<br \/>\nMD5: 3204e633b6892171830004aedc5b6907<br \/>\nMD5: e31e8f4805768c326e28c68a6f406acc<br \/>\nMD5: d6e06c98db7a0d38440d300accf8c730<br \/>\nMD5: d74528f426054fdcaca65a7e25b0d8dd<br \/>\nMD5: d1aa5e38fabe1811dfa113c6185c665e<br \/>\nMD5: 97141a85483998dff7e4aa04ce39b4f3<br \/>\nMD5: c6f2f67ddb2da9cebd9a669d964df6a7<br \/>\nMD5: 405b25f0834ad6c50ddfa203ac3112b4<\/p>\n<p><strong><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\">Webroot\u00a0SecureAnywhere<\/a><\/strong>\u00a0users are proactively protected from these threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals continue adapting to the exponential penetration of mobile devices through the systematic release of DIY (do-it-yourself) mobile number harvesting tools, successfully setting up the foundations for commercial managed\/on demand mobile phone number harvesting services, ultimately leading to an influx of mobile \u00a0malware\/spam campaigns. In addition to boutique based DIY operations, sophisticated, &#8216;innovation&#8217; and market [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[17367,17351,17347,23171,17353,16239,23175,17357,17345,15475,23173,4539,15147,17355,15149,12441,4029,17359,23169,17349],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16158"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=16158"}],"version-history":[{"count":31,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16158\/revisions"}],"predecessor-version":[{"id":25799,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16158\/revisions\/25799"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=16158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=16158"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=16158"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=16158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}