Botherders herded

2008-03-01

Helen Martin

Virus Bulletin, UK
Editor: Helen Martin

Abstract

Botherder arrests, court appearances and convictions.


Canadian police have rounded up 17 people suspected of participating in a significant botnet operation. Following an investigation that began in 2006, officers from the Sûreté du Québec and the Royal Canadian Mounted Police arrested the 17 suspects last month in 12 towns across Québec.

Charges against the suspects - whose ages range from 17 to 26 - include illegally obtaining computer services, hacking computer data and the possession of passwords for the purpose of committing crimes. If convicted, the accused could each face up to 10 years in prison.

Meanwhile, in the US a youth has pled guilty to controlling as many as 400,000 PCs with the intention of infecting users with adware. The young man, who uses the handle 'SoBe', was still a teenager at the time of his crimes, yet together with his accomplice managed to earn close to $58,000 in just over a year. His accomplice, Jeanson James Ancheta, has already started serving a 57-month federal prison sentence for his role in the crime. 'SoBe', who will be sentenced in May, faces up to 15 years in prison.

Finally, 18-year-old New Zealander Owen Thorn Walker, who is suspected of being the ringleader behind an enormous botnet operation has appeared in a New Zealand court. Walker, who uses the handle 'Akill', is believed to have been behind a botnet of 1.3 million computers and was arrested in November following an operation involving local police as well as authorities in the Netherlands and the FBI. Charges against Walker include two counts of accessing a computer for dishonest purposes, two counts of accessing a computer system without permission, and a single count of damaging a computer system as well as possessing hacking software. If convicted Walker faces up to 10 years imprisonment.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.