You are here: Home » European Union News » Busted Botnet: Unveillance Uncovers the International Spread of the Malicious Software program Behind New Botnet Arrests

Busted Botnet: Unveillance Uncovers the International Spread of the Malicious Software program Behind New Botnet Arrests

by admin on January 9, 2013

Wilmington, DE (PRWEB) June 28, 2011

In early June, eastern European news outlets reported that a law enforcement process force investigation resulted in the arrest of two males charged with stealing several hundred thousand bucks even though operating a massive network of compromised computers known as a botnet. Operation Hive, a joint operation in between the FBI, Interpol, the Serbian Ministry of Inner Affairs and the Slovenian Police lead to the arrest of two suspects.

&#13

Unveillance, a information leak intelligence company, has been studying this botnet for a number of months and reports that there are impacted individuals and companies in at least 172 countries, which includes the United States, Russia, Brazil, China, Wonderful Britain, India and Iran. The malicious software package (malware) at the heart of this investigation is the Butterfly Bot Kit, also acknowledged as Palevo, Pilleuz or Rimecud. This is the exact same software program that was used to infect the millions of computers in the Mariposa botnet. Primarily based on intelligence gathered from its network of worldwide sensors, Unveillance estimates that this botnet is more substantial than Mariposa.

&#13

Even though a couple of of the domains utilized to control the botnet have been suspended, Unveillance has discovered that many domains remain reside and are actively harvesting data stolen from victims with infected computer systems. At this time it is unknown if law enforcement agencies are aware of the remaining active domains and it is possible that there are other men and women controlling these domains who have not nevertheless been arrested in conjunction with this investigation.

&#13

Unveillance researchers Matt Thompson and Meaghan Molloy have reunited with their former Mariposa Functioning Group companion, Panda Protection, to gather and analyze many thousand unique variants of malicious software package related with this botnet. Butterfly Bot is polymorphic malware that spreads via removable drives this kind of as USB keys, making it extremely difficult to have and eliminate from a network. Firms and people infected with Butterfly Bot often finds themselves in a perpetual cycle of reinfection. It is the ease with which this variety of malware can spread that permits botnets to grow to such an immense dimension.

&#13

Unveillance reports that employing Butterfly Bot to infect computers, the suspects allegedly stole private information as nicely as bank account credentials from folks and firms globally. The FBIs inclusion means it is likely that American accounts are also affected.

&#13

According to Unveillance, one particular of the alleged masterminds made little try to cover his tracks and employed the same electronic mail deal with to register many domains utilized to management this botnet. In some circumstances the suspect also employed his actual title and an tackle in Banja Luka, other connected domains were registered under different names and addresses. Eastern European news outlets refer to one of the suspects as a laptop or computer genius and allege that he has previously been arrested for cybercrime. 1 of the suspects had apparently been enjoying his newfound wealth, having recently purchased a luxury apartment and a number of autos well worth all around 75K USD every single. The second suspect seems to have lived a quieter life in a rented apartment with his wife. Reports indicate that in the course of the arrests police seized pc tools and illegal firearms.

&#13

In the wake of the current LulzSec antics, it is surprising that this story has not nevertheless attracted the consideration of any English language newspapers, says Karim Hijazi, CEO of Unveillance. When justifying their actions, the members of LulzSec have been speedy to point out that there are several more criminals at function in the planet, most of whom dont send out tweets every time they violate personalized and corporate networks.

&#13

About Unveillance

&#13

Unveillance has developed the initial Software-as-as-Services (SaaS) Data Leak Intelligence Platform. Leveraging fully passive monitoring, with out the use of any on premises hardware, software program or agent install, our platform is able to assess regardless of whether an organization, country and/or governments network is actively compromised by innovative persistent threats (APT) and thus participating in a botnet infrastructure at a one hundred% zero false constructive rate. The intelligence platform is able to provide metrics on severity, frequency and scope of infection as well as show profitable remediation efforts through a special rating program referred to as the DLI (Data Leak Intelligence) Score. http://www.unveillance.com &#13
&#13

Associated Back links:&#13

http://hr.seebiz.eu/na-meti-banjaluckih-hakera-bile-slovenske-banke/ar-4747/&#13

http://www.information-industry.ba/bs/crna-hronika/13239-aljoa-borkovi-i-darko-malini-osumnjieni-za-hakerske-pljake&#13

http://www.kurir-info.rs/crna-hronika/banjalucki-hakeri-opustosili-strane-racune-93703.php&#13

http://www.nezavisne.com/novosti/bih/FBI-zainteresovan-za-hakera-iz-Banjaluke-91913.html

&#13

###

&#13
&#13
&#13
&#13
&#13

Comments on this entry are closed.