Windows Operators have just 2 Weeks for Safeguarding Computers against Twin Malware Programs
Windows users are being provided 2-weeks time for safeguarding their systems from twin dangerous malicious programs following UK officials who together with the Inrerpol managed towards getting hold over the command-and-control infrastructures that the hackers operated, published pcpro.co.uk dated June 2, 2014.
Known as the Tovar operation, it helped dismantle the servers set up with GameoverZeus and CryptoLocker whose dissemination is usually through phishing e-mails else dubious e-mail attachments. Both GameoverZeus and CryptoLocker work in combination, but when the former cannot get sufficient data for mining or selling, CryptoLocker goes the whole hog.
CryptoLocker locks all files of the host PC by encrypting them and then demands one bitcoin at ransom for decrypting those same files, whilst GameoverZeus -its other name P2PZeus- captures online banking credentials.
It was in May end-week 2014 that Operation Tovar got started when the National Crime Agency of UK, the Federal Bureau of Investigation of USA, European international police along with several technical companies including Dell and McAfee joined force. Together, organizations from eleven nations participated, enabling officials to gain hold over the hackers' CnCs for halting the assaults.
Robert Anderson, Executive Assistant Director of FBI declared that GameoverZeus was an unparallel botnet in sophistication that FBI along with its associates had ever tried dismantling. The efforts declared on June 2, 2014 followed directly from the fruitful associations the agency had with its allies within the global law enforcement, the United States government and private sector, he elaborated. Infosecurity-magazine.com published this, June 2, 2014.
Reverberating on Anderson's statement, Global Vice-President Rik Ferguson of Trend Micro said that the synchronized never like before partnership between security industry, ISPs, and law enforcement established one fresh standard within the realm of cyber-safety. Infosecurity-magazine.com published this.
But, the fight would continue, Ferguson noted.
He blogged that law enforcement's eventual objective was for stopping tainted PCs from interacting amongst themselves thus considerably destabilizing the physical structures under cyber-criminals' control. According to him, while the said operation was effective, it wasn't an all-time solution and it was thought that the sinister infrastructures would get back to their original form in weeks. Securityweek.com published this, June 2, 2014.
» SPAMfighter News - 07-06-2014