Suspected bot master busted
In what prosecutors have labeled the first case of its kind in the nation, a federal grand jury charged Jeanson James Ancheta with 17 counts of conspiracy and computer crime stemming from his alleged profitable use of bot nets. Over nearly a year, Ancheta allegedly used automated software to infect Windows systems, advertised and sold access to the compromised PCs, and used the software to perpetrate click fraud, garnering tens of thousands of dollars in affiliate fees, according to a 58-page indictment released on Thursday.
"This is the first case to charge someone for using bots for generating profits," said James Aquilina, Assistant U.S. Attorney for the Central District of California and the prosecutor on the case."On the one hand, he is selling bots to other people so that they can (perform) denial-of-service attacks and spam to make money. And on the other hand, he is using bots to make affiliate income."
The arrest comes as authorities are turning up the heat on bot herders, the name for people that control millions of compromised computers worldwide. In October, Dutch authorities arrested three men in the Netherlands who allegedly controlled a network of more than 1.5 million compromised computers. In August, the FBI and Microsoft helped authorities in Turkey and Morocco track down two men suspected of creating and spreading the Zotob worm--a program that consisted of bot software modified to exploit a flaw in Windows 2000.
The arrests have driven some developers of bot software underground, but many security researchers are doubtful that convictions in the cases will significantly reduce the threat. One reason: Bot software increasingly forms the core of the newest worms, such as Zotob, because the programs only need the exploit for the latest vulnerability to start spreading among computer systems.
However, previous cases have focused on other aspects of the crimes, not the actual underground trade in compromised computers, Aquilina said.
The latest case stems from two separate investigations into bot software. During the summer 2004, investigators started looking into an advertisement posted in the Internet Relay Chat (IRC) channel #botz4sale that linked to a price list for buying compromised computers. And in late 2004 and early 2005, computers at the Defense Information Security Agency (DISA) and the Weapons Division of the U.S. Naval Air Warfare Center in China Lake, California, became infected with bot software.
Sponsored: Network DDoS protection