Feeds

Spanish cops cuff 11 for €1m-a-year ransomware scam

Interpol says Reveton malware ring has been smashed

High performance access to file storage

Spanish police have arrested 11 individuals suspected of running a €1m a year ransomware scam using malware that posed as a message from law enforcement.

Law enforcement agencies in Spain first became interested in the Reveton malware after hundreds of complaints from victims of the scam starting flooding in at the beginning of 2011. Trend Micro and the Spanish agencies worked with the European Cybercrime Centre (EC3) at Europol in an operation coordinated by Interpol over the months that followed - sharing intelligence, samples and related technical detail. Police said the research allowed them to map of the criminal network infrastructure including traffic redirection and command-and-control servers. They then conducted raids on premises, seizing IT equipment and credit cards used to cash out the money that victims had paid.

In a statement (Spanish), cops said that since it was detected in May 2011, there had been more than 1,200 complaints about the so-called "POLICE VIRUS" (Reveton drive-by malware).

Police said this intelligence led to the arrest of 11 individuals. One of the suspects, an unnamed 27-year-old, is suspected to be the boss of the gang that produces the Reveton ransomware.

This Russian national was arrested in Dubai, United Arab Emirates. Spanish authorities have filed an extradition warrant. Along with this key arrest, police said they had run a takedown operation focusing on the lower-ranked members of gang, in connection with which they made several additional arrests.

Police said lower-ranked members in the gang were involved in monetisation of the PaySafeCard/Ukash vouchers received as payment in the scam. The gang had a branch in Spain's Costa Del Sol that exchanged these vouchers and converted them into real money, which would then be sent to the main group in Russia. Europol said in a separate statement:

The financial cell of the network specialised in laundering the proceeds of their crimes, obtained in the form of electronic money. For this, the gang employed both virtual systems for money laundering and other traditional systems using various online gaming portals, electronic payment gateways or virtual coins.

Spanish cops said 10 of the suspects had been arrested in connection with allegations of money-laundering activity. Six of the cuffed suspects are Russian, two Ukrainian and two Georgian, but all of them were based in Spain, police said.

Spanish cops reckon the fraudsters behind the scam were pulling in €1m a year.

"This coordinated activity (in much the same way as the Trend Micro/FBI action against the DNS Changer gang last year), leading directly to the arrest of individuals believed to be actively engaged in cybercrime, rather than simply taking down associated infrastructure, should serve as a model for how the security industry and law enforcement can effectively cooperate int he fight against online crime," said Rik Ferguson, director of security research and communications at Trend Micro.

Trend Micro has blogged about the arrests here.

Police ransomware locks up systems and accuses the user of using illegal filesharing networks or of child abuse image distribution. The ransomware uses police logos to make it look like it came from a law enforcement agency to convince victims to cough a "fine" of around €100 using cash vouchers in order to unlock their computers. More details of the Reveton ransomware at the centre of the scam can be found here (PDF). ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Bad PUPPY: Undead Windows XP deposits fresh scamware on lawn
Installing random interwebs shiz will bork your zombie box
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.