Darkode Malware Marketplace Shut Down

The advertised products included personal information from customers who participated in an automobile auction, personal information of 39,000 people from a database of Social Security numbers and 20 million emails and usernames that could be used to target people for identity theft, phishing emails or other schemes.

The programs for sale included “ransomware,” a virus that can lock a computer or network until a ransom is paid to the hacker who installed it.

Those arrested or searched live in the United States, United Kingdom, Australia, Bosniz-Herzegovina, Brazil, Canada, Colombia, Costa Rica, Croatia, Cyprus, Denmark, Finland, Germany, Israel, Latvia, Macedonia, Nigeria, Romania, Serbia and Sweden. There are victims in all of those countries, and others, authorities said.

Darkode is responsible for hundreds of millions in financial losses, the FBI said. The scale of the investigation, which involved 20 countries, was unprecedented.

CutThePrice-a big nuisance for browsers

CutThePrice is offered as a tool for savings and online shopping. Actually, this program is adware classified as PUP (potentially unwanted program) because it can compromise your security. CutThePrice adware is often deceptively installed with other free programs and updates.

CutThePrice is installed as a Windows application. It is also installed in your web browsers as extension, add-on, or browser helper object.

You will find many folders in program files or program files(X86) location with variations of his produt name such as cuttthePRice, cutthePRICE, cutthepprice..and so on. It brings down many chnage sin your browser home page, search page and makes browsing very slow.

Mobile Exposure to Web Based Threats

Mobile devices are constantly connected to a network. This connectivity exposes them to vulnerabilities and illegitimate access. There are various threats that mobile devices can encounter, namely, application threats, web-based threats, network threats and physical threats. Application threats are software pieces which are downloaded onto your phone usually in the form of an app. They seem to be completely normal but are designed to commit fraud or take over your phone’s resources. Malware, Spyware, Privacy threats and Exposure to Vulnerabilities are some types of application-based threats. Malware eats up your phone’s resources and changes the performance and functionality of your phone for the worse. Spyware and Privacy threats commit security breaches by invading into personal data and transmitting it to the hacker. Some apps may provide access through vulnerabilities which allows hackers to perform undesirable actions on your phone.


Then, there are web-based threats. Since the mobile device is connected to the Internet and are frequently used to access web services, they pose threats such as Phishing scams, Drive-by Downloads and Browser Exploits. Phishing scams deceive you into providing personal and financial information through email, messages, social media etc. Drive-By Downloads automatically downloads a file when you visit a webpage, allowing it access to your device resources. It is seen that around 60% of web-based threats are malicious. They propagate a virus or some kind of malware which depreciates the usage of your phone. 21% of web-based threats are Phishing scams which intend to seize financial information. The remaining 19% consist of Compromised attacks which uses vulnerabilities to stop functioning of an application the way it is supposed to. Even popular applications and OS like Java, Adobe Reader, Windows and Internet Explorer and Android are common targets.