Feeds

Police probe Sasser informant

Reward booty under threat

  • alert
  • submit to reddit

Internet Security Threat Report 2014

The informant who led police to the self-confessed author of the infamous Sasser worm is himself under investigation.

Marle B. - the man who provided the tip-off to Microsoft that led to the arrest of Sven Jaschan, 18 - has become a suspect in the German police's computer sabotage inquiry. Munich-based weekly Focus reports that a criminal investigation would blight Marle B's chances of a share in the $250,000 reward money from Microsoft's Anti-Virus Reward Program that caused him to come forward in the first place.

"If he was involved in Sasser, then he will go away empty-handed," Microsoft spokesman, Thomas Baumgaertner, told Focus.

18-year-old Jaschan was arrested in the village of Waffensen near Rotenburg, in northern Germany, on 7 May in connection with writing and distributing the Sasser worm. He later confessed to police that he was both the author of Sasser and the original author of the NetSky worm. Police are expected to lay computer sabotage charges against Jaschan, who has been released on bail pending further proceedings.

Last week German police raided five homes and questioned five further suspects as the inquiry into the release of the NetSky worm widened. The five new suspects are all school-friends of Jaschan, according to local reports. Two of the suspects questioned have admitted receiving the source code of NetSky from Jaschan and one has admitted distributing a version of the noxious NetSky worm. Suspects were questioned but no further arrests were made.

Public prosecutor Helmut Trentmann told German news agency DPA that Jaschan's confession has expedited the 18 year-old trial, which could begin in a juvenile court in a matter of weeks. ®

Related stories

Sasser worm creates havoc
Sasser creates European pandemonium
German police arrest Sasser worm suspect
German police raid five homes in Sasser case
Dabber exploits Sasser flaw
Sasser suspect fanclub launches appeal

Internet Security Threat Report 2014

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.