Authorities bust 3 in infection of 13M computers - Fandom Forums
Fandom Forums



Go Back   Fandom Forums > General > World News

World News Post and discuss news articles on recent world events here!

Reply
 
Thread Tools Display Modes
Old 03-03-2010, 06:23 AM   #1
kluang
One Punch Man
 
kluang's Avatar
 
Join Date: Apr 2006
Posts: 6,404
Thanks: 3,166
Thanked 4,595 Times in 2,087 Posts
kluang is a splendid one to beholdkluang is a splendid one to beholdkluang is a splendid one to beholdkluang is a splendid one to beholdkluang is a splendid one to beholdkluang is a splendid one to beholdkluang is a splendid one to beholdkluang is a splendid one to beholdkluang is a splendid one to beholdkluang is a splendid one to beholdkluang is a splendid one to behold
Authorities bust 3 in infection of 13M computers

http://news.yahoo.com/s/ap/20100302/..._botnet_busted

Quote:
SAN FRANCISCO – Authorities have smashed one of the world's biggest networks of virus-infected computers, a data vacuum that stole credit cards and online banking credentials from as many as 12.7 million poisoned PCs.

The "botnet" of infected computers included PCs inside more than half of the Fortune 1,000 companies and more than 40 major banks, according to investigators.

Spanish investigators, working with private computer-security firms, have arrested the three alleged ringleaders of the so-called Mariposa botnet, which appeared in December 2008 and grew into one of the biggest weapons of cybercrime. More arrests are expected soon in other countries.

Spanish authorities have planned a news conference for Wednesday in Madrid.

The arrests are significant because the masterminds behind the biggest botnets aren't often taken down. And the story of investigators' hunt for them offers a rare glimpse at the tactics used to trace the origin of computer crimes.

Also, the suspects go against the stereotype of genius programmers often associated with cyber crime. The suspects weren't brilliant hackers but had underworld contacts who helped them build and operate the botnet, Cesar Lorenza, a captain with Spain's Guardia Civil, which is investigating the case, told The Associated Press.

Investigators were examining bank records and seized computers to determine how much money the criminals made.

"They're not like these people from the Russian mafia or Eastern European mafia who like to have sports cars and good watches and good suits — the most frightening thing is they are normal people who are earning a lot of money with cybercrime," Lorenza said.

The three suspects were described as Spanish citizens with no criminal records. They weren't named and their mug shots weren't released, which Lorenza said is standard in Spain to protect the privacy of defendants. They face up to six years in prison if convicted of hacking charges.

Authorities identified them by their Internet handles and their ages: "netkairo," 31; "jonyloleante," 30; and "ostiator," 25.

Botnets are networks of infected PCs that have been hijacked from their owners, often without their knowledge, and put into the control of criminals. Linked together, the machines supply an enormous amount of computing power to spammers, identity thieves, and Internet attackers.

The Mariposa botnet, which has been dismantled, was easily one of the world's biggest. It spread to more than 190 countries, according to researchers. It also appears to be far more sophisticated than the botnet that was used to hack into Google Inc. and other companies in the attack that led Google to threaten to pull out of China.

The researchers that helped take down Mariposa first started looking at it in the spring of 2009.

Chris Davis, CEO of Ottawa-based Defence Intelligence, said he noticed the infections when they appeared on networks of some of his firm's clients, including pharmaceutical companies and banks.

It wasn't until several months later that he realized the infections were part of something much bigger.

After seeing that some of the servers used to control computers in the botnet were located in Spain, Davis and researchers from the Georgia Tech Information Security Center joined with software firm Panda Security, which is headquartered in Bilbao, Spain.

The investigators caught a few lucky breaks. For one, the suspects used Internet services that wound up cooperating with investigators. That isn't always the case.

Critically, one suspect also made direct connections from his own computer to try and reclaim control of his botnet after authorities took it down around Christmas. Investigators were able to identify him based on that traffic. They were able to back up their claims with records from domains he registered where he would eventually host malicious content.

It turned out that the botnet runners had infected computers by instant-messaging malicious links to contacts on infected computers. They also got viruses onto removable thumb drives and through peer-to-peer networks. The program used to create the botnet was known as Mariposa, from the Spanish word for "butterfly."

"I don't think there's anything about this guy that makes him smarter than any of the other botnet guys, but the (Mariposa) software, it's very professional, it's very effective," said Pedro Bustamante, senior research adviser with Panda Security. "It came alive and started spreading and it got bigger than him."

While arrests of people accused of running smaller botnets are fairly common, the biggest botnet leaders are rarely nabbed. That's partly because it's easy for criminals to hide their identities by disguising the source of their Internet traffic. Often, every computing resource they use is stolen.

For instance, there have been no busts yet in the spread of the Conficker worm, which infected 3 million to 12 million PCs running Microsoft Corp.'s Windows operating system and caused widespread fear that it could be used as a kind of Internet super weapon. The Conficker botnet is still active, but is closely watched by security researchers. The infected computers have so far been used to make money in ordinary ways, pumping out spam and spreading fake antivirus software.
__________________









To err is human, to forgive, divine. Humans aren't machines... they have souls, feelings. They live, they die, they love, they hate... And yes, they even make mistakes.....

When kluang finds you creepy and wrong then you are beyond horrible.

He who fights with monsters should look to it that he himself does not become a monster. And when you gaze long into an abyss the abyss also gazes into you.

Two things are infinite: the universe and human stupidity; and I'm not sure about the the universe.



Quis custodiet ipsos custodes?

Being Malaysian is about driving in a German car to an Indian restaurant for an Indonesian food, then travelling home, grabbing a Pakistani kebab on the way, to sit on Swedish furniture and watch American shows on a Japanese TV. Because we have no originality.






kluang is offline   Reply With Quote


Old 03-03-2010, 09:45 PM   #2
Freshgrease
▂▅▇█▓▒░◕‿‿◕░▒▓█▇▅▂
 
Freshgrease's Avatar
 
Join Date: Feb 2005
Age: 26
Posts: 4,112
Thanks: 1,487
Thanked 1,005 Times in 546 Posts
Freshgrease is a name known to allFreshgrease is a name known to allFreshgrease is a name known to allFreshgrease is a name known to allFreshgrease is a name known to allFreshgrease is a name known to allFreshgrease is a name known to allFreshgrease is a name known to allFreshgrease is a name known to allFreshgrease is a name known to all
Re: Authorities bust 3 in infection of 13M computers

Yeah. Bot nets are fun. You have hackers trying to hack other hackers' botnets (that can basically run any code you launch to them via irc) to gain more power and animosity.

Scary thing is, I've seen some (bot-net attached viruses) that can actually flash your BIOS firmware corrupting it and making the entire computer unuseable forever. All it takes is a command. Then again, the computers are more useful when users are oblivious to the infections and they can launch attacks that require massive amounts of computers.

You can make money by renting them out too.
Freshgrease is offline   Reply With Quote
Reply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



All times are GMT -4. The time now is 03:01 AM.


Powered by vBulletin® Version 3.8.3
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.