Feeds

Cybercrims dump swag on open botnet server

Health data found on hacker data dump

The essential guide to IT transformation

Everyone knows Trojans steal personal data, but the discovery of a server containing more than 1.4 gigabytes of stolen business and personal info brings home the real extent of the problem.

Data on the so-called crimeware server compromised 5,388 unique log files containing both email communications and web-related data. Net security firm Finjan reports that information on the server included business and customer data from 40 top-tier global businesses, including healthcare providers. It reckons the data was amassed in less than a month using two strains of malware - Backdoor IRCBot-CDO and Trojan-PSW Agent-AFA.

The hacker-controlled server was running a botnet command and control application. In addition, the compromised system was used as a "drop site" for private information. Compromised information included patient data, business email and bank customer data.

The compromised data was left in plain view on the hacker-controlled server, without any access restrictions or encryption. Thus the sensitive information was available to anyone who came across the server, not just the hackers who controlled it.

The compromised data and the Command and Control applications were detected by Finjan using its code inspection technology. It reckons the compromised data represents the tip of a "cybercrime iceberg".

Finjan notified the affected financial institutions - located in the US, Europe and India - and law enforcement agencies prior to issuing an alert on the attack on Tuesday. ®

Next gen security for virtualised datacentres

More from The Register

next story
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.