1. Welcome Guest! In order to create a new topic or reply to an existing one, you must register first. It is easy and free. Click here to sign up now!.
    Dismiss Notice

US disrupts hacking schemes that stole millions

Discussion in 'News & Current Events' started by allheart55 (Cindy E), Jun 3, 2014.

  1. allheart55 (Cindy E)

    allheart55 (Cindy E) Administrator Administrator

    Joined:
    Jun 11, 2009
    Messages:
    10,617
    Location:
    Pennsylvania
    Operating System:
    Windows 10
    Computer Brand or Motherboard:
    ASUS M4A77TD AM3 AMD 770 ATX AMD
    CPU:
    AMD Phenom II X6 1090T-Thuban 3.2GHz
    Memory:
    Crucial-DDR3 SDRAM 1333-8GB
    Hard Drive:
    WD Caviar Black SE HDD 640 GB - WD Caviar Black SE HDD 500 GB
    Graphics Card:
    Sapphire Radeon HD-7870 2GB
    Power Supply:
    CORSAIR CMPSU-750W
    WASHINGTON (AP) — A band of hackers implanted viruses on hundreds of thousands of computers around the world, secretly seized customer bank information and stole more than $100 million from businesses and consumers, the Justice Department said Monday in announcing charges against the Russian man accused of masterminding the effort.

    In unveiling the criminal case, federal authorities said they disrupted European-based cyber threats that were sophisticated, lucrative and global.

    In one scheme, the criminals infected computers with malicious software that captured bank account numbers and passwords, then used that information to secretly divert millions of dollars from victims' bank accounts to themselves. In another, they locked hacking victims out of their own computers, secretly encrypted personal files on the machines and returned control to the users only when ransom payments of several hundred dollars were made.

    "The criminals effectively held for ransom every private email, business plan, child's science project, or family photograph — every single important and personal file stored on the victim's computer," Leslie Caldwell, the head of the Justice Department's criminal division, said at a news conference.

    Working with officials in more than 10 other countries, the FBI and other agencies recently seized computer servers that were central to the crimes, which affected hundreds of thousands of computers.

    The FBI called the alleged ringleader, 30-year-old Evgeniy Bogachev, one of the most prolific cyber criminals in the world and issued a "Wanted" poster that lists his online monikers and describes him as a boating enthusiast. He faces criminal charges in Pittsburgh, where he was named in a 14-count indictment, and in Nebraska, where a criminal complaint was filed. He has not been arrested, but Deputy Attorney General James Cole said U.S. authorities were in contact with Russia to try to bring him into custody.

    Officials say the case is another stark reminder of the evolving cybercrime threat, though it's unrelated to the recently unsealed cyber-espionage indictment of five Chinese military hackers accused of stealing trade secrets from American firms. Both sets of hackers relied on similar tactics — including sending emails to unsuspecting victims that installed malware — but the Chinese defendants were government officials who sought information that could bring Chinese companies a competitive advantage.

    Bogachev's operation, prosecutors say, consisted of criminals in Russia, Ukraine and the United Kingdom who were assigned different roles within the conspiracy. The group is accused in the development of both "Gameover Zeus" — a network of infected computers that intercepted customer bank account numbers and passwords that victims typed in— and "Cryptolocker," malicious software that hijacked victims' computers and demands ransom payments. Computer users who don't pay the fee generally lose their files for good.
    The victims of the different schemes included an American Indian tribe in Washington state; an insurance company and a firm that runs assisted living centers in Pennsylvania; a local police department in Massachusetts; a pest control company in North Carolina; and a restaurant operator in Florida.

    The Pittsburgh indictment unsealed Monday also accuses Bogachev's group of trying to siphon hundreds of thousands of dollars from the bank accounts of Haysite Reinforced Plastics of Erie, in northwestern Pennsylvania, on a single day in 2011. According to the indictment, two of the transfers went through — one for about $198,000 and one for about $175,000 — but multiple other attempted transfers did not.

    Officials with Haysite did not immediately return phone calls for comment Monday. The accounts were with Pittsburgh-based PNC Bank, which declined to comment.

    A Florida bank lost nearly $7 million through an unauthorized wire transfer. The Swansea, Massachusetts, police department, on the other hand, lost $750 when it paid a ransom demanded by the malicious software that infected its computers.

    Last week, a federal judge in Pittsburgh granted a temporary restraining order against Bogachev and the others, demanding that they cease such activities. That order was unsealed along with the charges Monday.

    http://news.yahoo.com/us-disrupts-hacking-schemes-stole-millions-005201213--politics.html
     
  2. Plastic Nev

    Plastic Nev SUPER MODERATOR IN MEMORY

    Joined:
    May 2, 2009
    Messages:
    2,801
    Location:
    In front of a monitor in Blackburn Lanc's UK.
    Operating System:
    Windows 7
    I have seen elsewhere that although the authorities have seized and shut down multiple servers, it would seem the code required to operate the Gameover Zeus botnet itself is likely too well distributed amongst the rest of the hacker underworld to guarantee that the botnet is shut down for longer than two weeks.
    Fortunately the malware itself is now well known by the antivirus and antimalware companies so scans with any of the better makes should be able to find and remove it from affected computers. Therefore at least reducing the botnet in numbers of computers under its control.
    It just depends on folks using decent antimalware and running it.

    Nev.
     

Share This Page