Botnet Operation Disabled By the FBI : RushPRNews - Newswire & Global Press Release Distribution

 
Bookmark and Share

Botnet Operation Disabled By the FBI

April 14, 2011

Botnet Operation Disabled By the FBI
e-mail fraud - spam

WASHINTON, DC (RPRN) 04/14/11 — FBI Seizes Servers to Stop Cyber Fraud

n an unprecedented move in the fight against cyber crime, the FBI has disrupted an international cyber fraud operation by seizing the servers that had infected as many as two million computers with malicious software.

Botnets are networks of virus-infected computers controlled remotely by an attacker. They can be used to steal funds, hijack identities, and commit other crimes. The botnet in this case involves the potent Coreflood virus, a key-logging program that allows cyber thieves to steal personal and financial information by recording unsuspecting users’ every keystroke.


Woman typing on laptop

The Coreflood Virus 

The Coreflood virus infects only Microsoft Windows-based computers. Generally, most users will not be able to tell if their computers are infected. It is therefore important to take the following steps:

- Make sure your Microsoft Windows Automatic Updates are turned on;

- Run anti-virus programs and ensure that theyare up to date;

- Run a security firewall on your computer; and

- Check your online banking and credit history to make sure you have not been compromised. If you have been compromised, contact your financial institution.

To learn more about what you can do to protect your computer, including how to download and receive updates on security vulnerabilities, go to the following sites operated by U.S. Computer Emergency Readiness Team (CERT) and the Federal Trade Commission, respectively: us-cert.gov/nav/nt01 and onguardonline.gov/topics/malware.aspx.

Once a computer or network of computers is infected by Coreflood—infection may occur when users open a malicious e-mail attachment—thieves control the malware through remote servers. The Department of Justice yesterday received search warrants to effectively disable the Coreflood botnet by seizing the five U.S. servers used by the hackers.

“Botnets and the cyber criminals who deploy them jeopardize the economic security of the United States and the dependability of the nation's information infrastructure,” said Shawn Henry, executive assistant director of the FBI’s Criminal, Cyber, Response, and Services Branch. “These actions to mitigate the threat posed by the Coreflood botnet are the first of their kind in the United States,” Henry noted, “and reflect our commitment to being creative and proactive in making the Internet more secure.”

Now that we have interrupted the operation of the botnet servers, our cyber specialists can prevent Coreflood from sending stolen financial information to the cyber thieves. But victims’ computers still remain infected. That’s why we have been working closely with our private-sector partners.

Anti-virus companies are developing updated signatures to detect and remove Coreflood. To disinfect Microsoft Windows-based systems—and to keep them virus free—users are encouraged to run anti-virus software and to keep their Microsoft Windows Updates current (see sidebar).

Victimized computers that have not been disinfected using anti-virus software updates will continue to attempt to contact the Coreflood botnet servers. When this happens, we will respond by issuing a temporary stop command to the virus and then alert that user's Internet service provider (ISP), who will inform the customer that their computer is still infected. At no time will we be collecting any personal data from victim computers.

“For most infected users who are conscientious about keeping their anti-virus programs up to date, the process of disinfection will be as invisible as the Coreflood infection was itself,” said one of our cyber agents. Still, there is a process in place with ISPs to make sure notification occurs if necessary.

We began our Coreflood investigation in April 2009 when a Connecticut-based company realized that hundreds of computers on its networks had been infected. Before we shut down the Coreflood operation, cyber thieves made numerous fraudulent wire transfers, costing companies hundreds of thousands of dollars.

Yesterday, a civil complaint was filed in Connecticut against 13 “John Doe” defendants, alleging that they engaged in wire fraud, bank fraud, and illegal interception of electronic communications. Search warrants were obtained for the command and control servers in Arizona, Georgia, Texas, Ohio, and California. And a seizure warrant was issued in Connecticut for 29 Internet domain names used by the thieves.

Media Web Address: http://www.fbi.gov/news/stories/2011/april/botnet_041411/botnet_041411
Main image credits: newsjunkies.com
Click here to see all news from this author/company

Filed Under: BREAKING NEWS, Featured, Politics, PRESS RELEASE

RUSH PR NEWS newswire and press release services at rushprnews.com / Anne Howard annehowardpublicist.com

Content- Legal Responsibility - All material is copyrighted - You may repost but you MUST link back to the original post on your page and acknowledge Rush PR News as the news source. Rush PR News is not legally and/or morally responsible for content of press releases, opinions expressed or fact-checking.

Rush PR News cannot be held legally responsible for material published and distributed through its newswire service or published in its press-room and therefore cannot be sued for published material. Third-party must be contacted directly to dispute content.

Rush PR News is not the contact for material published.

RSSFeed PRESS & SOCIAL MEDIA RELEASES

Aspect/Bruker 3-year partnership concluded in March 2015

SHOHAM, Israel 04/26/15 · A world leader in ground-breaking, compact benchtop MRI...

IT Secure Services Expands Business Operations Into Massachusetts

Manchester, NH 04/23/15 · Businesses In The 128 Tech Corridor Finally Have...

ASTEP Announces Cindy Gentry, Senior Partner at Mercer U.S., as New Advisory Board Member

NEW YORK, NY 04/21/15 · The Asperger Syndrome Training and Employment Partnership (ASTEP)...

500 BC Introduces YouQuest App. Update Your Life, Not Your Status.

Washington, DC 04/21/15 · Harnessing ancient wisdom to meet modern challenges. “Update...

Talkingtech.ca Launches Canadian Technology Forums

Toronto, Ontario 04/18/15 · Canadians with a love of everything hi-tech have...

Global Access CSG Announces New Chief Operating Officer

NEW YORK, NY and MINNEAPOLIS, MN 04/15/15 · Global Access CSG is pleased to announce the...

Newborn Foundation Featured at Shanghai Neonatal Forum

Saint Paul, MN / Shanghai, China 04/15/15 · Forum follows implementation visits to SW China newborn...

Minority-Owned Handbag Brand Continues to Emerge

Charlotte, NC 04/13/15 · He is commonly called “Mr. Sylvia”, but Sylvia...

By April 21, create a responsive site or be left out of Google top ranks

San Francisco, California 04/13/15 · By Anne Howard for TrafficStriker. Have you checked your...

Pressenger Mobile App Urges Users To Support Earth Day 2015 Thunderclap Campaign

Budapest, Hungary 04/11/15 · Participants use pre-call image to spread awareness about...

Diecasters shown how to save up to 85% off whole life running costs

Stuttgart, Germany 04/09/15 · Diecasters will be told how to save up...

Criminals Host Fake Government Services Web Sites

Reston, VA 04/08/15 · Criminals Host Fake Government Services Web Sites to...

Running Aces Introduces Renovated Simulcast Space in Preparation for Racing Season and Kentucky Derby

COLUMBUS, MN 04/08/15 ·   Running Aces Introduces Renovated Simulcast Space in Preparation...