Feeds

NZ police cuff teenage botnet mastermind suspect

Bot Roast bust

Protecting against web application threats using SSL

Updated New Zealand police have arrested an 18-year-old suspected of masterminding the compromise of a huge network of one million compromised PCs.

The unnamed teenager, who police have identified only by his online moniker of AKILL, was arrested as part of a larger FBI-led operation aimed at cracking down on the trade in compromised PCs, codenamed Operation Bot Roast.

AKILL is reckoned to be the ringleader of an elite international botnet coding group. Investigators reckon AKILL, who was taken in for questioning in the New Zealand city of Hamilton, began hacking while still at school. The teenager is suspected of leading a gang who used compromised PCs to raid online bank accounts via various phishing scams. Members of the gang also made money by running spam and denial of service attacks, as well as by loading compromised PCs with adware.

The teenager was released on police bail, following a raid on his home, pending further inquiries. If charged, he faces offences punishable on conviction by up to 10 years' imprisonment.

The FBI's update on Operation Bot Roast can be found here, as summarised in our earlier story here.

Since Operation Bot Roast was announced last June, eight individuals (all based in the US) have been prosecuted for crimes related to botnet activity. The ongoing investigative effort has thus far uncovered more than $20m in economic loss and more than one million compromised computers.

In related botnet news, European security agency ENISA estimates that 6m computers worldwide have been hijacked by hackers. It reckons browser exploits are responsible for more than two in three (65 per cent) of the infections that leave compromised PCs under the control of cybercriminals. Email attachments (13 per cent), operating system exploits (11 per cent), and downloaded internet files (9 per cent) are also popular infection methods.

Compromised zombie PCs are used to send spam, mount denial of services attacks, or as resources in various identity theft scams. ENISA reckons the top five locations of infected computers are China, the US, Germany, Spain and France. ENISA has put together a map of botnets and chart of Infection methods here.

Bots are surreptitiously installed and commonly managed remotely via Command & Control servers. An estimated 1,000 command and control servers, each controlling an average of 20,000 zombie clients, are running at any one time. Each zombie client is potentially capable of churning out an estimated 259.000 junk mail messages per day.

ENISA is calling for concerted efforts to counter the botnet threat involving users education (Windoze users running unpatched systems and mindlessly clicking on malicious links remain a leading source of infection) and internationally co-ordinated efforts involving law enforcement agencies to track and takedown zombie PC networks and the cybercriminals behind them. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.