The Daily Caveat is written by Michael Thomas, a recovering corporate investigator in the Washington, DC-area.

CARE TO CONTRIBUTE?

TIPS, COMMENTS and QUESTIONS are always welcome (and strictly confidential).

Contact The Daily Caveat via:



Join our mailing list to new posts via email.



Or justrss icon read the feed...


Previous Posts
10/12/2005
Dutch Police Crack Zombie Ring
When hackers infiltrate and unsuspecting user's PC and quietly beging using it as a basecamp for sending out malicious code - such as virus-laden emails, that PC is said to have been zombified. Creepy name for a really creapy practice. What makes it so pernicious, in part, is that the user may never know that their machine has been hacked.

According to this article from Computing.co.uk, authorities in the Netherlands have just cracked a hacker ring that has made zombies out of some 100,000 machines - the largest such pack zombies ever discoverd. And just in time for Halloween, too.
Cops smash 100,000 node botnet

Tom Sanders
October 10, 2005
vnunet.com

Dutch authorities arrested three individuals last week accused of running one of the largest ever hacker botnets comprising over 100,000 zombie PCs. The three men, aged 19, 22 and 27, were not named. Police confiscated computers, cash and a sports car during searches of the suspects' homes.

A botnet is a collection of hacked computers at the disposal of a hacker without the owner's knowledge. Botnets are commonly used to launch distributed denial of service (DDoS) attacks or to send spam. With over 100,000 infected systems, the network is one of the largest ever detected, prosecutors claimed.

The suspects will be charged with computer hacking, destructing automated networks, and installing adware and spyware. The trio used the W32.toxbot internet worm to recruit systems for their botnet army. The worm was first detected early this year and infected systems all over the world. Antivirus software to detect and remove the software is available, but the suspects kept changing their malware to avoid detection.

The authorities are also investigating the group's involvement in a blackmail attempt on an unnamed enterprise in the US. It is common practice among online crime gangs to extort the owners of websites, forcing them to pay to prevent a DDoS attack on their networks.

It is also suspected that the group was involved in crafting internet worms with keystroke logging software to gather login names to commit credit card fraud and identity theft.
The original article appears here.

-- MDT

Labels:

0 Comments.
Post a Comment


all content © Michael D. Thomas 2010