Feeds

Spanish cops cuff 11 for €1m-a-year ransomware scam

Interpol says Reveton malware ring has been smashed

Using blade systems to cut costs and sharpen efficiencies

Spanish police have arrested 11 individuals suspected of running a €1m a year ransomware scam using malware that posed as a message from law enforcement.

Law enforcement agencies in Spain first became interested in the Reveton malware after hundreds of complaints from victims of the scam starting flooding in at the beginning of 2011. Trend Micro and the Spanish agencies worked with the European Cybercrime Centre (EC3) at Europol in an operation coordinated by Interpol over the months that followed - sharing intelligence, samples and related technical detail. Police said the research allowed them to map of the criminal network infrastructure including traffic redirection and command-and-control servers. They then conducted raids on premises, seizing IT equipment and credit cards used to cash out the money that victims had paid.

In a statement (Spanish), cops said that since it was detected in May 2011, there had been more than 1,200 complaints about the so-called "POLICE VIRUS" (Reveton drive-by malware).

Police said this intelligence led to the arrest of 11 individuals. One of the suspects, an unnamed 27-year-old, is suspected to be the boss of the gang that produces the Reveton ransomware.

This Russian national was arrested in Dubai, United Arab Emirates. Spanish authorities have filed an extradition warrant. Along with this key arrest, police said they had run a takedown operation focusing on the lower-ranked members of gang, in connection with which they made several additional arrests.

Police said lower-ranked members in the gang were involved in monetisation of the PaySafeCard/Ukash vouchers received as payment in the scam. The gang had a branch in Spain's Costa Del Sol that exchanged these vouchers and converted them into real money, which would then be sent to the main group in Russia. Europol said in a separate statement:

The financial cell of the network specialised in laundering the proceeds of their crimes, obtained in the form of electronic money. For this, the gang employed both virtual systems for money laundering and other traditional systems using various online gaming portals, electronic payment gateways or virtual coins.

Spanish cops said 10 of the suspects had been arrested in connection with allegations of money-laundering activity. Six of the cuffed suspects are Russian, two Ukrainian and two Georgian, but all of them were based in Spain, police said.

Spanish cops reckon the fraudsters behind the scam were pulling in €1m a year.

"This coordinated activity (in much the same way as the Trend Micro/FBI action against the DNS Changer gang last year), leading directly to the arrest of individuals believed to be actively engaged in cybercrime, rather than simply taking down associated infrastructure, should serve as a model for how the security industry and law enforcement can effectively cooperate int he fight against online crime," said Rik Ferguson, director of security research and communications at Trend Micro.

Trend Micro has blogged about the arrests here.

Police ransomware locks up systems and accuses the user of using illegal filesharing networks or of child abuse image distribution. The ransomware uses police logos to make it look like it came from a law enforcement agency to convince victims to cough a "fine" of around €100 using cash vouchers in order to unlock their computers. More details of the Reveton ransomware at the centre of the scam can be found here (PDF). ®

Boost IT visibility and business value

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.