Feeds

19-year-old p2p botnet pioneer agrees to plead guilty

'Nugache was mine'

Build a business case: developing custom apps

The author of a Trojan that broke new ground by incorporating peer-to-peer technology into botnet design has agreed to plead guilty to secretly infecting thousands of victims' machines so that he could steal their personal data and launch attacks on websites.

Jason Michael Milmont, 19, of Cheyenne, Wyoming, admitted to creating the so-called Nugache Worm, a Trojan that spread through AOL instant messenger and modified Limewire installation programs. Once clicked on, the malware made unwitting users part of a botnet, which Milmont used to steal user names, passwords and account numbers of those who were infected.

Nugache was being circulated as early as early 2006 and spawned one of the first botnets to use a decentralized system to send instructions to drones, according to security researcher Dave Dittrich. Rather than relying on a single command and control channel, the zombie network used a peer-to-peer mechanism to communicate. Such technology fundamentally changed the cybercrime landscape by making it much harder to shut down botnets. (Later botnets such as Storm went on to use a different method to thwart shut down. So-called fast flux technology used DNS records to obscure where central command-and-control channels were located.)

Over time, Milmont added new features to Nugache. A graphical user interface made it easy to access infected machines from his home server. It allowed him to issue a command to a single machine, which would then transmit the command to other machines, until it had spread through the entire network. The program contained a keylogger and was also capable of sniffing sensitive information stored in Internet Explorer to spare users the hassle of having to remember passwords for online banks and other sensitive websites.

The software was invisible to the Windows task manager in versions NT, XP and 2000. At any given time, Milmont had anywhere from 5,000 to 15,000 machines under his control.

According to a plea agreement signed by Milmont, he used his botnet to launch distributed denial-of-service attacks against an unnamed online business located in the Los Angeles area. The agreement went on to document the way he used personal information he lifted from his victims to fatten his wallet.

After sending a command that instructed infected machines to transmit captured passwords and other information, he would order items online and take control of victims' accounts by changing the addresses and other details that were associated with them. In April 2007, for example, he used stolen credit card information to make a $1,422 purchase from Hinsite Global Technologies and had items shipped to a vacant residence in the Cheyenne area.

To prevent victims from discovering his scheme, Milmont replaced phone numbers associated with compromised accounts with Skype numbers he created and purchased using credit card data he had harvested from his botnet.

Milmont faces a maximum of five years in federal prison and a fine of $250,000. He's also agreed to pay almost $74,000 in restitution. Milmont has agreed to appear in federal court in Cheyenne, where he will plead guilty to one felony charge. The case was brought in Los Angeles and was investigated by the FBI. ®

This story was updated to correct misstatements about fast-flux techniques used in botnets.

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?