Feeds

NZ police cuff teenage botnet mastermind suspect

Bot Roast bust

Choosing a cloud hosting partner with confidence

Updated New Zealand police have arrested an 18-year-old suspected of masterminding the compromise of a huge network of one million compromised PCs.

The unnamed teenager, who police have identified only by his online moniker of AKILL, was arrested as part of a larger FBI-led operation aimed at cracking down on the trade in compromised PCs, codenamed Operation Bot Roast.

AKILL is reckoned to be the ringleader of an elite international botnet coding group. Investigators reckon AKILL, who was taken in for questioning in the New Zealand city of Hamilton, began hacking while still at school. The teenager is suspected of leading a gang who used compromised PCs to raid online bank accounts via various phishing scams. Members of the gang also made money by running spam and denial of service attacks, as well as by loading compromised PCs with adware.

The teenager was released on police bail, following a raid on his home, pending further inquiries. If charged, he faces offences punishable on conviction by up to 10 years' imprisonment.

The FBI's update on Operation Bot Roast can be found here, as summarised in our earlier story here.

Since Operation Bot Roast was announced last June, eight individuals (all based in the US) have been prosecuted for crimes related to botnet activity. The ongoing investigative effort has thus far uncovered more than $20m in economic loss and more than one million compromised computers.

In related botnet news, European security agency ENISA estimates that 6m computers worldwide have been hijacked by hackers. It reckons browser exploits are responsible for more than two in three (65 per cent) of the infections that leave compromised PCs under the control of cybercriminals. Email attachments (13 per cent), operating system exploits (11 per cent), and downloaded internet files (9 per cent) are also popular infection methods.

Compromised zombie PCs are used to send spam, mount denial of services attacks, or as resources in various identity theft scams. ENISA reckons the top five locations of infected computers are China, the US, Germany, Spain and France. ENISA has put together a map of botnets and chart of Infection methods here.

Bots are surreptitiously installed and commonly managed remotely via Command & Control servers. An estimated 1,000 command and control servers, each controlling an average of 20,000 zombie clients, are running at any one time. Each zombie client is potentially capable of churning out an estimated 259.000 junk mail messages per day.

ENISA is calling for concerted efforts to counter the botnet threat involving users education (Windoze users running unpatched systems and mindlessly clicking on malicious links remain a leading source of infection) and internationally co-ordinated efforts involving law enforcement agencies to track and takedown zombie PC networks and the cybercriminals behind them. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.