Hackers broke into poker pro’s hotel room to install ‘sharking’ malware



This September, on the Barcelona leg of the European Poker Tour, Jens Kyllönen had a strange run-in with the the criminal underworld. He had busted out of that day’s tournament early, but when he returned to his hotel room, his laptop was missing. He went downstairs to find his roommate, but when they came back to the room together , the laptop had mysteriously reappeared. And to make things even more suspicious, Kyllönen’s computerized room key was malfunctioning, triggered by some problem in the electronic door lock.


It took a trip to the malware research firm F Secure, but Kyllönen finally got to the bottom of it. He’d been targeted by criminals, who cracked his room’s electronic lock and installed a Remote Access Trojan on his laptop while he was playing in the tournament downstairs. Once operational, the software gave the attackers a view of whatever was happening Kyllönen’s screen. That’s inconvenient for most, but fatal for a professional poker player, who bets thousands of dollars both online and in face-to-face tournaments, it’s a much bigger problem. As soon as Kyllönen logged on, the attackers could see where he was playing and what his cards were. Getting their money was as simple as waiting for the right hand.

Luckily, Kyllönen spotted the attack before he could lose any money to it, but the news raises broader questions about attacks on gamblers, a tactic F Secure has dubbed “sharking,” By targeting poker pros with well publicized travel schedules, criminals can install the malware directly (in Kyllönen’s case, through a USB stick), and make their move while players are busy at the tables. Once the trojan is installed, the attackers can get their payoff whenever the target logs on to play a hand. To make things worse, there’s no telling how often this attack has been deployed. Kyllönen knew something was up when his computer had problems booting up, but when F Secure scanned Kyllönen’s roommate’s computer, they found the same trojan. The attackers are still at large.



About Gregory D Evans

Gregory Evans is one of the worlds greatest security consultants. Go to http://GregoryDEvans.com for more details.
This entry was posted in Cell phone security, cyber, internet safety, Technology, wireless and tagged , , , , , , , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s