Feeds

Canadian, 16, on Randex worm rap

Mounties slap cuffs on suspected author

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Canadian police have charged a 16 year-old youth with writing and distributing the damaging computer worm Randex.

The teenager from Mississauga, near Toronto, faces "mischief and fraudulent use of a computer" charges. Canadian authorities have withheld the suspect's name because he is a juvenile.

Royal Canadian Mounted Police investigators reckon Randex infected more than 9,000 computers shortly after the first versions of the worm appeared last November.

According to anti-virus firm Sophos, more than 20 versions of Randex are circulating. Randex variants are generally network worms with backdoor capabilities which allows a remote intruder to access and control the computer via IRC channels. This network of zombie PCs can be used to distribute spam or as a platform to launch DDoS attacks.

The Canadian courts have dealt with a high-profile computer crime case involving a teenager before. Denial of service attacks against eBay, Yahoo and Buy.com back in 2000 were traced back to Mafiaboy, a 17-year-old from Montreal, Canada.

Mafiaboy was sentenced to eight months in a youth detention centre after pleading guilty to 50 counts of "mischief to data". ®

Related stories

Trojans as spam robots: the evidence
Phatbot arrest throws open trade in zombie PCs
Phatbot suspect released on bail
Mafiaboy given eight months

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.