Maintain your poker face, but a Trojan is reading your cards

Hackers spy on your online poker hand, enter the game, and beat you

Online poker players are being targeted by malware designed to spy on their virtual hand.

The virus, Win32/Spy.Odlanor, shares screenshots of the victim's cards with its creators, who are then able to join the game with a clear view of the target's hand, allowing them to cheat their way to a winning hand.

IT security company ESET found the Trojan in programs meant to help poker fans play better, as well as popular file-sharing applications.

Some versions of the virus are capable of targeting other information on the infected computer, such as passwords.

In a blog post, Robert Lipovsky, a security researcher at ESET, explained the Windows-specific malware has been active for several months.

The software monitors PC activity after infecting a machine, waiting for a victim to log on to Pokerstars or Full Tilt Poker, two of the largest online poker sites.

Once logged on, users' activity along with their dealt cards are monitored and sent to the perpetrator.

A player's ID can be searched on either site, allowing the attacker to join their table with a significant advantage. It is still unclear if the trojan's operator plays games manually or in an automated manner, said Lipovsky.

ESET found the virus hiding in PC utilities, well-known file-sharing applications, poker calculators, and player databases.

Newer versions of the virus include a general-purpose data-stealing application that is able to extract passwords from web browsers as well. The majority of activity came from Eastern Europe, with a large concentration of victims in Russia and the Ukraine.

Featured Resources

The ultimate guide to business connectivity in field services

A roadmap to increased workplace efficiency

Free download

The definitive guide to migrating to the cloud

Migrate apps to the public cloud with multi-cloud infrastructure solutions

Free download

Transform your network with advanced load balancing from VMware

How to modernise load balancing to enable digital transformation

Free download

How to secure workloads in hybrid clouds

Cloud workload protection

Free download

Recommended

Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021
New malware uses search engine ads to target pirate gamers
malware

New malware uses search engine ads to target pirate gamers

21 Jul 2021
HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

17 Sep 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

17 Sep 2021