Feeds

Microsoft names Zeus ringleaders and notifies FBI

The Feds can find them in a UK jail

Protecting against web application threats using SSL

Microsoft has named two individuals who it says are the leaders behind the Zeus botnet and has passed on its dossier on them to the FBI.

Redmond fingered Yevhen Kulibaba and Yuriy Konovalenko as the two key players behind the botnet in an amended criminal complaint and told the FBI that the two were key to both the botnet itself, and to finding other individuals who were responsible for spreading an operating the malware and laundering the funds it was used to steal.

The FBI isn't going to have to look far for the duo however, as they are serving four years sentences in British prisons for Zeus-related charges. After they have finished their terms at Her Majesty's pleasure then the US can join the queue of countries looking to extradite the pair.

The two men, both Ukrainian, pleaded guilty to charges of conspiracy to defraud and received four year and eight months sentences. They, and 11 other co-conspirators, were arrested after an investigation by the UK's Central E-Crime Unit (PCeU).

"We will continue our efforts to serve defendants Kulibaba and Konovalenko, and the John Doe defendants, with this amended complaint," said Richard Boscovich, senior attorney Microsoft's Digital Crimes Unit in a blog post.

"Meanwhile, the botnets’ command and control domains remain disabled. It is Microsoft’s goal to ensure that these domains ultimately remain disabled, and we hope the evidence collected from these domains leads to a criminal investigation."

Boscovich said that the takedown of the botnet had been a major success and the number of infected PCs found in the wild has fallen from 779,816 in March to 336,393 for the last week in June. Spam messages purporting to come from the Electronic Payments Association that were used by the malware operators have also dropped around 90 per cent. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.