Submit your comments on this article |
-Lurid Crime Tales- |
Massive cyber theft ring shut down |
2011-04-15 |
![]() A computer virus, dubbed Coreflood, infected more than 2 million PCs, enslaving them into a "botnet" that grabbed banking credentials and other sensitive data its masters used to steal funds via fraudulent banking and wire transactions, the US Department of Justice said on Wednesday. The government shuttered that botnet, which had operated for a decade, by pulling the kill switch on five command and control centers after a federal court in Connecticut gave the go-ahead to take over the servers. "This was big money stolen on a large scale by foreign criminals. The FBI wanted to stop it and they did an incredibly good job at it," said Alan Paller, director of research at the SAN Institute, a nonprofit group that helps fight cyber crime. Security experts said the total losses suffered by the ring's victims were easily in the tens of millions of dollars and might top $100 million. A civil complaint against 13 unnamed foreign nationals was also filed by the US district attorney in Connecticut. It accused them of wire and bank fraud. The Justice Department said it had an ongoing criminal investigation. The malicious Coreflood software was used to infect computers with keylogging software that stole user names, passwords, financial data and other information, the Justice Department said. "The seizure of the Coreflood servers and Internet domain names is expected to prevent criminals from using Coreflood or computers infected by Coreflood for their nefarious purposes," US Attorney David Fein said in a statement. A botnet is essentially one or more servers that spread malicious software and use the software to send spam or to steal personal information or data that can be used to empty a victim's bank account. US government programrs shut down the botnet on Tuesday by taking over its command and control center. They instructed the computers enslaved in the botnet to stop sending stolen data and to shut down. A similar tactic was used in a Dutch case, but it was the first time US authorities had used this method to shut down a botnet, according to court documents. Victims of the botnet included a real estate company in Michigan that lost $115,771, a South Carolina law firm that lost $78,421 and a Tennessee defense contractor that lost $241,866, according to the complaint filed in the US District Court for the District of Connecticut. The government plans to work with Internet service providers around the country to identify other victims. |
Posted by:Fred |
#4 BTW, the article I linked was from 2008. The article ends with: After having two hub servers shut down by the tech security community in May, the Coreflood Gang rented two new hubs and picked up where they left off. Today, they continue operations unimpeded, says Stewart. Companies infiltrated by the Coreflood Gang need to rethink how they do network security. Employees surfing the Internet on work PCs ought to take pause. "If you don't understand the threats that are out there, then you probably should not be banking online," Stewart says. Can't say the computer security community wasn't warned. |
Posted by: Zebulon Thranter9685 2011-04-15 16:21 |
#3 Russian Coreflood Gang targets online bank accounts Call them the Coreflood Gang. A ring of cyber bank robbers from southern Russia has quietly perfected a way to get a beachhead inside company networks. Number of data-stealing infections: County school district: 31,425 Hotel chain: 14,093 U.S. health care company: 6,744 U.S. university hospital: 4,710 Australian university: 1,362 U.K. university: 1,310 U.S. university: 974 Payday loan company: 685 Hospital: 405 Health care system: 321 |
Posted by: Zebulon Thranter9685 2011-04-15 16:13 |
#2 Russian |
Posted by: Zebulon Thranter9685 2011-04-15 16:08 |
#1 C'mon, give us a hint. What flavor of botnet? Russian? Chinese? Iranian? Venezuelan? Equadorian? |
Posted by: mojo 2011-04-15 15:49 |