Uber Driver Robbing Passengers

no to uber-crimeshop

More Woes for Uber

Cristal M Clark

Uber just cannot seem to stay out of the news and by news, I mean bad news. In the past several years Uber and Uber Eats drivers have faced a plethora of charges, from assault, rape, to attempted murder and more recently the news has reported in detail just how easy it is for someone to print out an Uber logo and pretend to be an Uber driver. I actually saw this recently although the individual who had the fake Uber sticker in his window didn’t quite cut it out like a professional, it honestly looked like a 5-year-old did the work and the guy was smoking whilst driving. A pretty clear indication he was not in fact, a driver for Uber.

Jackie-Gordon-Wilson-mugshot-crimeshop

Straight off the wire today Police in San Mateo, California, have arrested 38-year-old Jackie Gordon Wilson, who allegedly dropped off his Uber Passengers at the airport then went back to their home to rob them blind.

What an ahole.

Surveillance footage from a doorbell camera showed a man approaching the front door on Thursday, then walking away from the house. Police say he was chased off when the security alarm went off.

But that was clearly not enough to make him stop trying to rob anyone because he was later caught on camera breaking into another home a few blocks away. The house was ransacked and a number of items had been stolen.

Jackie spent 4 hours, yes 4 hours ransacking the home and was seen on video taking bag after bag of valuables, including heirlooms that had been saved during the Holocaust.

The victim just so happened to post video of the burglary online and the other homeowner saw it and showed it to his former guests who recognized the man as their Uber driver.

During his arrest, some of the stolen property was found in his home as well as the clothes he was seen wearing in the videos.

Jackie was charged with first degree burglary, attempted first degree burglary, and resisting arrest.

Uber logo on car windshield-crimeshop.jpg

What is really shocking about this, is that many of the ride shares around share the same drivers so how is it that Lyft is not experiencing the same issues as Uber does? Uber seemingly has an unprecedented number of claims surrounding the service such as fake drivers, raping and killing women, violent prone drivers they supposedly background check to attempting to murder those that forgo a tip.

uber-vs-lyft-crimeshop

Uber not only has a bad reputation for passengers a quick Google search shows just how tarnished that reputation is with its drivers so it would be a fair assumption to believe that Uber is not able to attract the right kind of driver like other ride shares do, you know drivers who are not in the business of robbery, raping or killing.

Rideshares.jpeg

Quite Simply put, Uber needs to do a lot more in an effort to protect it’s passengers and they are clearly not willing to step up to the plate yet.

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

https://www.instagram.com/crimeshop.cc/?hl=en

And https://gab.ai/thecrimeshop

 

 

 

Flame Malware – I’m Back

stuxnet-flame-malware-back-for-good-crimeshop

Stuxnet, Flame Malware Making a Comeback

Cristal M Clark

Flame malware, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware that attacked computers running the Microsoft Windows operating system. The program was used for targeted cyber espionage in Middle Eastern countries. It was once what researchers referred to as a sophisticated little gem of malware, created as nation-state spy tools, once outed by Kaspersky Labs, it was quickly and quietly shuttered and forgotten about, until now.

flame-malware-crimeshop.jpg

It is believed to have been created by Israel, Flame was the first modular spy platform discovered in the wild, it came with multiple plug-ins that could be swapped out according to whatever tools were needed for each victim.

It had a lot of capability that was unique at the time it was discovered, and also used a highly sophisticated technique for spreading.

The attackers tricked Microsoft into issuing them a legitimate Microsoft certificate, which they then used to sign their malicious files. Then they subverted the trusted Windows Update mechanism, through which Microsoft distributes patches and software upgrades to customers, to deliver those malicious files to targeted victims instead, doing so in a way that made it look like they came from Microsoft’s server.

The attackers also managed a fleet of 80 command-and-control domains to communicate with infected machines then they faked Flame’s death back in May 2012, pushing out a kill module to infected machines and closing shop on the command-and-control servers.

Most researchers thought that the creators in a panic just shut things down but are not realizing that it may never have been truly shut down, just ehhh more or less running in the background unbeknownst to virtually everyone in the security world.

The original Flame attacked systems in Iran as well as other parts of the Middle East it would do things such as turn on the internal microphone of an infected machine to record conversations the user conducted near the computer or over Skype or, using the infected computer’s Bluetooth functionality, scan for other Bluetooth-enabled devices in the vicinity, such as a mobile phone, and siphon the contacts folder from it.

Great little piece of spyware honestly.

The attackers appear to have re-tooled their little spy kit and added strong encryption to make it harder to detect and reverse engineer according to researchers at Alphabet’s Chronicle Security labs who discovered that a new version of Flame appeared in 2014 (the original was back in 2012), and likely remained active until 2016 and beyond, giving them just enough time to steal and deploy whatever they would like.

Juan-Andres Guerrero-Saade, one of the Chronicle security researchers who made the discovery; “Nobody ever expected to see Flame again. We figured it was too old and expensive for the attackers to waste time retooling rather than just build a whole new platform.”

stuxnet-crimeshop

Juan-Andres did not just stop with that either, he went on to explain that he and his team also found evidence that Stuxnet, you know the virus/worm created by the US and Israel to sabotage Iran’s nuclear program in 2007, but ended up infecting virtually every PC in the US as well as globaly, has connections to another malware family known as Flowershop.

Oh Flowershop, Flowershop was operating as early as 2002, several years before Stuxnet was developed, and it appears that some of Flowershop’s code made it into a Stuxnet component, which if true means that a fourth team or group of individuals were part of America’s first Cyberwar campaign, the development of Stuxnet. What’s more is that researchers have in fact, previously found connections between Stuxnet and Flame and between Stuxnet and two other malware families known as Duqu and the Equation Group, the latter a group of tools attributed to the NSA.

The new discovery has baffled researchers who still do not have a full understanding into the full capabilities of Stuxnet and Flame, so it’s anyone’s guess as to what the creators of Flame might be up to these days, one thing is for certain, they do not plan on stopping anytime soon.

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

https://www.instagram.com/crimeshop.cc/?hl=en

And https://gab.ai/thecrimeshop