Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

FBI Ready for Annihilating Russian Botnet

In its maiden attempt for introducing more security on the Internet, the Federal Bureau of Investigation (FBI) an arm of the United States law enforcement, has snatched hold over a Russian botnet, which compromised innumerable PCs as also may've managed in acquiring admission into US law enforcement, military and diplomatic PCs. Computer Crime Research Center published this in news on May 10, 2011.

States the FBI, its officials have lessened a destructive PC malware from operating. This malware understandably utilized innumerable PCs, thousands of which were located in Connecticut for seizing financial data that unwitting end-users had divulged.

Moreover, as per court documents presented lately, over 2m PCs reportedly were contaminated with Coreflood a bot code, which clandestinely intercepted account numbers and passwords from PC operators so their bank balances could be drained off.

Hitherto, following the massive hack, the federal officials found a few unlikely victims. These are 30 universities and colleges, 17 government agencies of the local and state domains, a police cell, and 5 financial institutions and banks.

As for the present instance the Federal Bureau of Investigation's attack is on the Coreflood network of bots as the researchers call it. This network is spread globally which a group of cyber-criminals in Russia built for gaining hold over 2.3m PCs, which seized huge volumes of U.S. government and personal financial databases throughout a decade nearly, prior to being attacked for annihilation.

Once, researchers even found that Coreflood transmitted "master key" back to Russia that accessed PCs installed at the U.S mission inside Middle East.

Nevertheless, within court documents recorded following the FBI snatching hold over PC servers thought to be regulating the bot code, one agent of FBI deputed at New Haven's area office says that officials doubt PC servers in Estonia had been utilized for the extensive wire and bank fraud.

Significantly, during April 2011, FBI along with the Department of Justice acted for disabling Coreflood with the help of a method wherein law enforcement officials seized hold over the botnet via injecting their own C&C servers inside the network for issuing commands to the individual bot-infected computers.

Related article: FBI’s ICCC Annual Report Discusses Fraudulent and Non-Fraudulent Complaints

» SPAMfighter News - 5/16/2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next