Feeds

Police hold three in spam Trojan bust

'MOOP' members cuffed in UK and Finland

Next gen security for virtualised datacentres

Police in Finland and the UK this morning arrested three alleged members of a group dubbed "MOOP" suspected of delivering trojans via spam emails to gain access to confidential information stored on "thousands" of corporate machines, the Metropolitan Police's Computer Crime Unit has confirmed.

The three men, a 63-year-old from England, a 19-year-old from Finland and a 28-year-old from Scotland, are being questioned after computers were "seized at residential addresses in both countries in addition to the suspects' servers".

A Metropolitan Police statement reads: "This highly organised group are suspected of writing new computer viruses in order to avoid detection by anti-virus products. They have been primarily targeting UK businesses since at least 2005, and during this time thousands of computers are known to have been infected across the globe."

Detective Constable Bob Burls, of the Metropolitan Police Computer Crime Unit, added: "These men appear to be connected via an online company. We believe the suspects created and adapted viruses with the aim of causing massive infection by spamming. Today's arrests will send a clear worldwide signal to the authors of malicious software that national borders will not limit the ability and commitment of law enforcement authorities to clamp down on this criminal activity."

The virus in question is, according to CNet, called either "Ryknos", "Breplibot" or "Stinkx", and is delivered when unsuspecting users click on an attachment to an email which reads:

"Hello, Your photograph was forwarded to us as part of an article we are publishing for our December edition of Total Business Monthly. Can you check over the format and get back to us with your approval or any changes? If the picture is not to your liking then please send a preferred one. We have attached the photo with the article here. Kind regards, Jamie Andrews."

The "Breplibot" virus has previously been fingered for exploiting Sony-BMG's infamous rootkit DRM technology, and was delivered via a similar email.

The rootkit masked any files beginning with "$sys$", and Breplibot accordingly used this handy facility to drop the file "$sys$drv.exe" into the Windows system directory safe from the prying eyes of anti-virus software. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.